pulumi-snowflake 1.2.0a1743489585__py3-none-any.whl → 1.2.0a1744183688__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-snowflake might be problematic. Click here for more details.
- pulumi_snowflake/__init__.py +1 -0
- pulumi_snowflake/_inputs.py +12288 -12287
- pulumi_snowflake/account.py +186 -185
- pulumi_snowflake/account_authentication_policy_attachment.py +15 -14
- pulumi_snowflake/account_parameter.py +29 -28
- pulumi_snowflake/account_password_policy_attachment.py +15 -14
- pulumi_snowflake/account_role.py +32 -31
- pulumi_snowflake/alert.py +120 -119
- pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +158 -157
- pulumi_snowflake/api_authentication_integration_with_client_credentials.py +144 -143
- pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +154 -153
- pulumi_snowflake/api_integration.py +203 -202
- pulumi_snowflake/authentication_policy.py +134 -133
- pulumi_snowflake/config/__init__.py +1 -0
- pulumi_snowflake/config/__init__.pyi +1 -0
- pulumi_snowflake/config/outputs.py +16 -15
- pulumi_snowflake/config/vars.py +1 -0
- pulumi_snowflake/cortex_search_service.py +141 -140
- pulumi_snowflake/database.py +288 -287
- pulumi_snowflake/database_role.py +50 -49
- pulumi_snowflake/dynamic_table.py +218 -217
- pulumi_snowflake/email_notification_integration.py +56 -55
- pulumi_snowflake/execute.py +50 -49
- pulumi_snowflake/external_function.py +225 -224
- pulumi_snowflake/external_oauth_integration.py +232 -231
- pulumi_snowflake/external_table.py +197 -196
- pulumi_snowflake/external_volume.py +50 -49
- pulumi_snowflake/failover_group.py +106 -105
- pulumi_snowflake/file_format.py +512 -511
- pulumi_snowflake/function_java.py +249 -248
- pulumi_snowflake/function_javascript.py +193 -192
- pulumi_snowflake/function_python.py +263 -262
- pulumi_snowflake/function_scala.py +249 -248
- pulumi_snowflake/function_sql.py +179 -178
- pulumi_snowflake/get_account_roles.py +12 -11
- pulumi_snowflake/get_accounts.py +12 -11
- pulumi_snowflake/get_alerts.py +17 -16
- pulumi_snowflake/get_connections.py +7 -6
- pulumi_snowflake/get_cortex_search_services.py +12 -11
- pulumi_snowflake/get_current_account.py +5 -4
- pulumi_snowflake/get_current_role.py +3 -2
- pulumi_snowflake/get_database.py +15 -14
- pulumi_snowflake/get_database_role.py +14 -13
- pulumi_snowflake/get_database_roles.py +12 -11
- pulumi_snowflake/get_databases.py +22 -21
- pulumi_snowflake/get_dynamic_tables.py +7 -6
- pulumi_snowflake/get_external_functions.py +12 -11
- pulumi_snowflake/get_external_tables.py +12 -11
- pulumi_snowflake/get_failover_groups.py +7 -6
- pulumi_snowflake/get_file_formats.py +12 -11
- pulumi_snowflake/get_functions.py +12 -11
- pulumi_snowflake/get_grants.py +2 -1
- pulumi_snowflake/get_masking_policies.py +12 -11
- pulumi_snowflake/get_materialized_views.py +12 -11
- pulumi_snowflake/get_network_policies.py +12 -11
- pulumi_snowflake/get_parameters.py +27 -26
- pulumi_snowflake/get_pipes.py +12 -11
- pulumi_snowflake/get_procedures.py +12 -11
- pulumi_snowflake/get_resource_monitors.py +7 -6
- pulumi_snowflake/get_row_access_policies.py +12 -11
- pulumi_snowflake/get_schemas.py +22 -21
- pulumi_snowflake/get_secrets.py +12 -11
- pulumi_snowflake/get_security_integrations.py +12 -11
- pulumi_snowflake/get_sequences.py +12 -11
- pulumi_snowflake/get_shares.py +7 -6
- pulumi_snowflake/get_stages.py +12 -11
- pulumi_snowflake/get_storage_integrations.py +2 -1
- pulumi_snowflake/get_streamlits.py +12 -11
- pulumi_snowflake/get_streams.py +17 -16
- pulumi_snowflake/get_system_generate_scim_access_token.py +8 -7
- pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +8 -7
- pulumi_snowflake/get_system_get_private_link_config.py +11 -10
- pulumi_snowflake/get_system_get_snowflake_platform_info.py +4 -3
- pulumi_snowflake/get_tables.py +12 -11
- pulumi_snowflake/get_tags.py +7 -6
- pulumi_snowflake/get_tasks.py +22 -21
- pulumi_snowflake/get_users.py +22 -21
- pulumi_snowflake/get_views.py +17 -16
- pulumi_snowflake/get_warehouses.py +17 -16
- pulumi_snowflake/grant_account_role.py +43 -42
- pulumi_snowflake/grant_application_role.py +43 -42
- pulumi_snowflake/grant_database_role.py +57 -56
- pulumi_snowflake/grant_ownership.py +43 -42
- pulumi_snowflake/grant_privileges_to_account_role.py +95 -94
- pulumi_snowflake/grant_privileges_to_database_role.py +95 -94
- pulumi_snowflake/grant_privileges_to_share.py +127 -126
- pulumi_snowflake/legacy_service_user.py +1039 -1038
- pulumi_snowflake/managed_account.py +113 -112
- pulumi_snowflake/masking_policy.py +106 -105
- pulumi_snowflake/materialized_view.py +120 -119
- pulumi_snowflake/network_policy.py +92 -91
- pulumi_snowflake/network_policy_attachment.py +43 -42
- pulumi_snowflake/network_rule.py +106 -105
- pulumi_snowflake/notification_integration.py +238 -237
- pulumi_snowflake/oauth_integration_for_custom_clients.py +210 -209
- pulumi_snowflake/oauth_integration_for_partner_applications.py +134 -133
- pulumi_snowflake/object_parameter.py +57 -56
- pulumi_snowflake/outputs.py +9273 -9272
- pulumi_snowflake/password_policy.py +246 -245
- pulumi_snowflake/pipe.py +148 -147
- pulumi_snowflake/primary_connection.py +55 -54
- pulumi_snowflake/procedure_java.py +267 -266
- pulumi_snowflake/procedure_javascript.py +197 -196
- pulumi_snowflake/procedure_python.py +267 -266
- pulumi_snowflake/procedure_scala.py +267 -266
- pulumi_snowflake/procedure_sql.py +197 -196
- pulumi_snowflake/provider.py +303 -302
- pulumi_snowflake/pulumi-plugin.json +1 -1
- pulumi_snowflake/resource_monitor.py +134 -133
- pulumi_snowflake/row_access_policy.py +78 -77
- pulumi_snowflake/saml2_integration.py +246 -245
- pulumi_snowflake/schema.py +316 -315
- pulumi_snowflake/scim_integration.py +106 -105
- pulumi_snowflake/secondary_connection.py +57 -56
- pulumi_snowflake/secondary_database.py +288 -287
- pulumi_snowflake/secret_with_authorization_code_grant.py +109 -108
- pulumi_snowflake/secret_with_basic_authentication.py +95 -94
- pulumi_snowflake/secret_with_client_credentials.py +99 -98
- pulumi_snowflake/secret_with_generic_string.py +81 -80
- pulumi_snowflake/sequence.py +99 -98
- pulumi_snowflake/service_user.py +1015 -1014
- pulumi_snowflake/share.py +50 -49
- pulumi_snowflake/shared_database.py +246 -245
- pulumi_snowflake/stage.py +190 -189
- pulumi_snowflake/storage_integration.py +166 -165
- pulumi_snowflake/stream_on_directory_table.py +100 -99
- pulumi_snowflake/stream_on_external_table.py +114 -113
- pulumi_snowflake/stream_on_table.py +124 -123
- pulumi_snowflake/stream_on_view.py +124 -123
- pulumi_snowflake/streamlit.py +148 -147
- pulumi_snowflake/table.py +113 -112
- pulumi_snowflake/table_column_masking_policy_application.py +43 -42
- pulumi_snowflake/table_constraint.py +155 -154
- pulumi_snowflake/tag.py +92 -91
- pulumi_snowflake/tag_association.py +71 -70
- pulumi_snowflake/task.py +1002 -1001
- pulumi_snowflake/user.py +1101 -1100
- pulumi_snowflake/user_authentication_policy_attachment.py +29 -28
- pulumi_snowflake/user_password_policy_attachment.py +29 -28
- pulumi_snowflake/user_public_keys.py +43 -42
- pulumi_snowflake/view.py +136 -135
- pulumi_snowflake/warehouse.py +232 -231
- {pulumi_snowflake-1.2.0a1743489585.dist-info → pulumi_snowflake-1.2.0a1744183688.dist-info}/METADATA +1 -1
- pulumi_snowflake-1.2.0a1744183688.dist-info/RECORD +148 -0
- pulumi_snowflake-1.2.0a1743489585.dist-info/RECORD +0 -148
- {pulumi_snowflake-1.2.0a1743489585.dist-info → pulumi_snowflake-1.2.0a1744183688.dist-info}/WHEEL +0 -0
- {pulumi_snowflake-1.2.0a1743489585.dist-info → pulumi_snowflake-1.2.0a1744183688.dist-info}/top_level.txt +0 -0
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
|
|
5
|
+
import builtins
|
|
5
6
|
import copy
|
|
6
7
|
import warnings
|
|
7
8
|
import sys
|
|
@@ -21,42 +22,42 @@ __all__ = ['Saml2IntegrationArgs', 'Saml2Integration']
|
|
|
21
22
|
@pulumi.input_type
|
|
22
23
|
class Saml2IntegrationArgs:
|
|
23
24
|
def __init__(__self__, *,
|
|
24
|
-
saml2_issuer: pulumi.Input[str],
|
|
25
|
-
saml2_provider: pulumi.Input[str],
|
|
26
|
-
saml2_sso_url: pulumi.Input[str],
|
|
27
|
-
saml2_x509_cert: pulumi.Input[str],
|
|
28
|
-
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
29
|
-
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
30
|
-
comment: Optional[pulumi.Input[str]] = None,
|
|
31
|
-
enabled: Optional[pulumi.Input[str]] = None,
|
|
32
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
33
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
|
|
34
|
-
saml2_force_authn: Optional[pulumi.Input[str]] = None,
|
|
35
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
36
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
37
|
-
saml2_sign_request: Optional[pulumi.Input[str]] = None,
|
|
38
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
39
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
40
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None):
|
|
25
|
+
saml2_issuer: pulumi.Input[builtins.str],
|
|
26
|
+
saml2_provider: pulumi.Input[builtins.str],
|
|
27
|
+
saml2_sso_url: pulumi.Input[builtins.str],
|
|
28
|
+
saml2_x509_cert: pulumi.Input[builtins.str],
|
|
29
|
+
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
30
|
+
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
31
|
+
comment: Optional[pulumi.Input[builtins.str]] = None,
|
|
32
|
+
enabled: Optional[pulumi.Input[builtins.str]] = None,
|
|
33
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
34
|
+
saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
|
|
35
|
+
saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
|
|
36
|
+
saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
37
|
+
saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
|
|
38
|
+
saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
|
|
39
|
+
saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
40
|
+
saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
41
|
+
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None):
|
|
41
42
|
"""
|
|
42
43
|
The set of arguments for constructing a Saml2Integration resource.
|
|
43
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
44
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
45
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
46
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
48
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
49
|
-
:param pulumi.Input[str] comment: Specifies a comment for the integration.
|
|
50
|
-
:param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
51
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
52
|
-
:param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
53
|
-
:param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
54
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
55
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
56
|
-
:param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
57
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
58
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
59
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
44
|
+
:param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
45
|
+
:param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
46
|
+
:param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
47
|
+
:param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
50
|
+
:param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
|
|
51
|
+
:param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
52
|
+
:param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
53
|
+
:param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
54
|
+
:param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
55
|
+
:param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
56
|
+
:param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
57
|
+
:param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
58
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
59
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
60
|
+
:param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
60
61
|
"""
|
|
61
62
|
pulumi.set(__self__, "saml2_issuer", saml2_issuer)
|
|
62
63
|
pulumi.set(__self__, "saml2_provider", saml2_provider)
|
|
@@ -91,253 +92,253 @@ class Saml2IntegrationArgs:
|
|
|
91
92
|
|
|
92
93
|
@property
|
|
93
94
|
@pulumi.getter(name="saml2Issuer")
|
|
94
|
-
def saml2_issuer(self) -> pulumi.Input[str]:
|
|
95
|
+
def saml2_issuer(self) -> pulumi.Input[builtins.str]:
|
|
95
96
|
"""
|
|
96
97
|
The string containing the IdP EntityID / Issuer.
|
|
97
98
|
"""
|
|
98
99
|
return pulumi.get(self, "saml2_issuer")
|
|
99
100
|
|
|
100
101
|
@saml2_issuer.setter
|
|
101
|
-
def saml2_issuer(self, value: pulumi.Input[str]):
|
|
102
|
+
def saml2_issuer(self, value: pulumi.Input[builtins.str]):
|
|
102
103
|
pulumi.set(self, "saml2_issuer", value)
|
|
103
104
|
|
|
104
105
|
@property
|
|
105
106
|
@pulumi.getter(name="saml2Provider")
|
|
106
|
-
def saml2_provider(self) -> pulumi.Input[str]:
|
|
107
|
+
def saml2_provider(self) -> pulumi.Input[builtins.str]:
|
|
107
108
|
"""
|
|
108
109
|
The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
109
110
|
"""
|
|
110
111
|
return pulumi.get(self, "saml2_provider")
|
|
111
112
|
|
|
112
113
|
@saml2_provider.setter
|
|
113
|
-
def saml2_provider(self, value: pulumi.Input[str]):
|
|
114
|
+
def saml2_provider(self, value: pulumi.Input[builtins.str]):
|
|
114
115
|
pulumi.set(self, "saml2_provider", value)
|
|
115
116
|
|
|
116
117
|
@property
|
|
117
118
|
@pulumi.getter(name="saml2SsoUrl")
|
|
118
|
-
def saml2_sso_url(self) -> pulumi.Input[str]:
|
|
119
|
+
def saml2_sso_url(self) -> pulumi.Input[builtins.str]:
|
|
119
120
|
"""
|
|
120
121
|
The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
121
122
|
"""
|
|
122
123
|
return pulumi.get(self, "saml2_sso_url")
|
|
123
124
|
|
|
124
125
|
@saml2_sso_url.setter
|
|
125
|
-
def saml2_sso_url(self, value: pulumi.Input[str]):
|
|
126
|
+
def saml2_sso_url(self, value: pulumi.Input[builtins.str]):
|
|
126
127
|
pulumi.set(self, "saml2_sso_url", value)
|
|
127
128
|
|
|
128
129
|
@property
|
|
129
130
|
@pulumi.getter(name="saml2X509Cert")
|
|
130
|
-
def saml2_x509_cert(self) -> pulumi.Input[str]:
|
|
131
|
+
def saml2_x509_cert(self) -> pulumi.Input[builtins.str]:
|
|
131
132
|
"""
|
|
132
133
|
The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
133
134
|
"""
|
|
134
135
|
return pulumi.get(self, "saml2_x509_cert")
|
|
135
136
|
|
|
136
137
|
@saml2_x509_cert.setter
|
|
137
|
-
def saml2_x509_cert(self, value: pulumi.Input[str]):
|
|
138
|
+
def saml2_x509_cert(self, value: pulumi.Input[builtins.str]):
|
|
138
139
|
pulumi.set(self, "saml2_x509_cert", value)
|
|
139
140
|
|
|
140
141
|
@property
|
|
141
142
|
@pulumi.getter(name="allowedEmailPatterns")
|
|
142
|
-
def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
143
|
+
def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
|
143
144
|
"""
|
|
144
145
|
A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
145
146
|
"""
|
|
146
147
|
return pulumi.get(self, "allowed_email_patterns")
|
|
147
148
|
|
|
148
149
|
@allowed_email_patterns.setter
|
|
149
|
-
def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
150
|
+
def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
|
150
151
|
pulumi.set(self, "allowed_email_patterns", value)
|
|
151
152
|
|
|
152
153
|
@property
|
|
153
154
|
@pulumi.getter(name="allowedUserDomains")
|
|
154
|
-
def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
155
|
+
def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
|
155
156
|
"""
|
|
156
157
|
A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
157
158
|
"""
|
|
158
159
|
return pulumi.get(self, "allowed_user_domains")
|
|
159
160
|
|
|
160
161
|
@allowed_user_domains.setter
|
|
161
|
-
def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
162
|
+
def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
|
162
163
|
pulumi.set(self, "allowed_user_domains", value)
|
|
163
164
|
|
|
164
165
|
@property
|
|
165
166
|
@pulumi.getter
|
|
166
|
-
def comment(self) -> Optional[pulumi.Input[str]]:
|
|
167
|
+
def comment(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
167
168
|
"""
|
|
168
169
|
Specifies a comment for the integration.
|
|
169
170
|
"""
|
|
170
171
|
return pulumi.get(self, "comment")
|
|
171
172
|
|
|
172
173
|
@comment.setter
|
|
173
|
-
def comment(self, value: Optional[pulumi.Input[str]]):
|
|
174
|
+
def comment(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
174
175
|
pulumi.set(self, "comment", value)
|
|
175
176
|
|
|
176
177
|
@property
|
|
177
178
|
@pulumi.getter
|
|
178
|
-
def enabled(self) -> Optional[pulumi.Input[str]]:
|
|
179
|
+
def enabled(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
179
180
|
"""
|
|
180
181
|
Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
181
182
|
"""
|
|
182
183
|
return pulumi.get(self, "enabled")
|
|
183
184
|
|
|
184
185
|
@enabled.setter
|
|
185
|
-
def enabled(self, value: Optional[pulumi.Input[str]]):
|
|
186
|
+
def enabled(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
186
187
|
pulumi.set(self, "enabled", value)
|
|
187
188
|
|
|
188
189
|
@property
|
|
189
190
|
@pulumi.getter
|
|
190
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
191
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
191
192
|
"""
|
|
192
193
|
Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
193
194
|
"""
|
|
194
195
|
return pulumi.get(self, "name")
|
|
195
196
|
|
|
196
197
|
@name.setter
|
|
197
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
198
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
198
199
|
pulumi.set(self, "name", value)
|
|
199
200
|
|
|
200
201
|
@property
|
|
201
202
|
@pulumi.getter(name="saml2EnableSpInitiated")
|
|
202
|
-
def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[str]]:
|
|
203
|
+
def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
203
204
|
"""
|
|
204
205
|
The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
205
206
|
"""
|
|
206
207
|
return pulumi.get(self, "saml2_enable_sp_initiated")
|
|
207
208
|
|
|
208
209
|
@saml2_enable_sp_initiated.setter
|
|
209
|
-
def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[str]]):
|
|
210
|
+
def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
210
211
|
pulumi.set(self, "saml2_enable_sp_initiated", value)
|
|
211
212
|
|
|
212
213
|
@property
|
|
213
214
|
@pulumi.getter(name="saml2ForceAuthn")
|
|
214
|
-
def saml2_force_authn(self) -> Optional[pulumi.Input[str]]:
|
|
215
|
+
def saml2_force_authn(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
215
216
|
"""
|
|
216
217
|
The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
217
218
|
"""
|
|
218
219
|
return pulumi.get(self, "saml2_force_authn")
|
|
219
220
|
|
|
220
221
|
@saml2_force_authn.setter
|
|
221
|
-
def saml2_force_authn(self, value: Optional[pulumi.Input[str]]):
|
|
222
|
+
def saml2_force_authn(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
222
223
|
pulumi.set(self, "saml2_force_authn", value)
|
|
223
224
|
|
|
224
225
|
@property
|
|
225
226
|
@pulumi.getter(name="saml2PostLogoutRedirectUrl")
|
|
226
|
-
def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
|
|
227
|
+
def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
227
228
|
"""
|
|
228
229
|
The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
229
230
|
"""
|
|
230
231
|
return pulumi.get(self, "saml2_post_logout_redirect_url")
|
|
231
232
|
|
|
232
233
|
@saml2_post_logout_redirect_url.setter
|
|
233
|
-
def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
|
|
234
|
+
def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
234
235
|
pulumi.set(self, "saml2_post_logout_redirect_url", value)
|
|
235
236
|
|
|
236
237
|
@property
|
|
237
238
|
@pulumi.getter(name="saml2RequestedNameidFormat")
|
|
238
|
-
def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
|
|
239
|
+
def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
239
240
|
"""
|
|
240
241
|
The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
241
242
|
"""
|
|
242
243
|
return pulumi.get(self, "saml2_requested_nameid_format")
|
|
243
244
|
|
|
244
245
|
@saml2_requested_nameid_format.setter
|
|
245
|
-
def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
|
|
246
|
+
def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
246
247
|
pulumi.set(self, "saml2_requested_nameid_format", value)
|
|
247
248
|
|
|
248
249
|
@property
|
|
249
250
|
@pulumi.getter(name="saml2SignRequest")
|
|
250
|
-
def saml2_sign_request(self) -> Optional[pulumi.Input[str]]:
|
|
251
|
+
def saml2_sign_request(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
251
252
|
"""
|
|
252
253
|
The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
253
254
|
"""
|
|
254
255
|
return pulumi.get(self, "saml2_sign_request")
|
|
255
256
|
|
|
256
257
|
@saml2_sign_request.setter
|
|
257
|
-
def saml2_sign_request(self, value: Optional[pulumi.Input[str]]):
|
|
258
|
+
def saml2_sign_request(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
258
259
|
pulumi.set(self, "saml2_sign_request", value)
|
|
259
260
|
|
|
260
261
|
@property
|
|
261
262
|
@pulumi.getter(name="saml2SnowflakeAcsUrl")
|
|
262
|
-
def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
|
|
263
|
+
def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
263
264
|
"""
|
|
264
265
|
The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
265
266
|
"""
|
|
266
267
|
return pulumi.get(self, "saml2_snowflake_acs_url")
|
|
267
268
|
|
|
268
269
|
@saml2_snowflake_acs_url.setter
|
|
269
|
-
def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
|
|
270
|
+
def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
270
271
|
pulumi.set(self, "saml2_snowflake_acs_url", value)
|
|
271
272
|
|
|
272
273
|
@property
|
|
273
274
|
@pulumi.getter(name="saml2SnowflakeIssuerUrl")
|
|
274
|
-
def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
|
|
275
|
+
def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
275
276
|
"""
|
|
276
277
|
The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
277
278
|
"""
|
|
278
279
|
return pulumi.get(self, "saml2_snowflake_issuer_url")
|
|
279
280
|
|
|
280
281
|
@saml2_snowflake_issuer_url.setter
|
|
281
|
-
def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
|
|
282
|
+
def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
282
283
|
pulumi.set(self, "saml2_snowflake_issuer_url", value)
|
|
283
284
|
|
|
284
285
|
@property
|
|
285
286
|
@pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
|
|
286
|
-
def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
|
|
287
|
+
def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
287
288
|
"""
|
|
288
289
|
The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
289
290
|
"""
|
|
290
291
|
return pulumi.get(self, "saml2_sp_initiated_login_page_label")
|
|
291
292
|
|
|
292
293
|
@saml2_sp_initiated_login_page_label.setter
|
|
293
|
-
def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
|
|
294
|
+
def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
294
295
|
pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
|
|
295
296
|
|
|
296
297
|
|
|
297
298
|
@pulumi.input_type
|
|
298
299
|
class _Saml2IntegrationState:
|
|
299
300
|
def __init__(__self__, *,
|
|
300
|
-
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
301
|
-
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
302
|
-
comment: Optional[pulumi.Input[str]] = None,
|
|
301
|
+
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
302
|
+
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
303
|
+
comment: Optional[pulumi.Input[builtins.str]] = None,
|
|
303
304
|
describe_outputs: Optional[pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationDescribeOutputArgs']]]] = None,
|
|
304
|
-
enabled: Optional[pulumi.Input[str]] = None,
|
|
305
|
-
fully_qualified_name: Optional[pulumi.Input[str]] = None,
|
|
306
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
307
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
|
|
308
|
-
saml2_force_authn: Optional[pulumi.Input[str]] = None,
|
|
309
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
310
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
311
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
312
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
313
|
-
saml2_sign_request: Optional[pulumi.Input[str]] = None,
|
|
314
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
315
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
316
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
317
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
318
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
305
|
+
enabled: Optional[pulumi.Input[builtins.str]] = None,
|
|
306
|
+
fully_qualified_name: Optional[pulumi.Input[builtins.str]] = None,
|
|
307
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
308
|
+
saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
|
|
309
|
+
saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
|
|
310
|
+
saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
|
|
311
|
+
saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
312
|
+
saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
|
|
313
|
+
saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
|
|
314
|
+
saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
|
|
315
|
+
saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
316
|
+
saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
317
|
+
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
|
|
318
|
+
saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
319
|
+
saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
|
|
319
320
|
show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationShowOutputArgs']]]] = None):
|
|
320
321
|
"""
|
|
321
322
|
Input properties used for looking up and filtering Saml2Integration resources.
|
|
322
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
323
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
324
|
-
:param pulumi.Input[str] comment: Specifies a comment for the integration.
|
|
323
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
324
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
325
|
+
:param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
|
|
325
326
|
:param pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationDescribeOutputArgs']]] describe_outputs: Outputs the result of `DESCRIBE SECURITY INTEGRATION` for the given integration.
|
|
326
|
-
:param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
327
|
-
:param pulumi.Input[str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
|
|
328
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
329
|
-
:param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
330
|
-
:param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
331
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
332
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
333
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
334
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
335
|
-
:param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
336
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
337
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
338
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
339
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
340
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
327
|
+
:param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
328
|
+
:param pulumi.Input[builtins.str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
|
|
329
|
+
:param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
330
|
+
:param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
331
|
+
:param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
332
|
+
:param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
333
|
+
:param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
334
|
+
:param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
335
|
+
:param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
336
|
+
:param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
337
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
338
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
339
|
+
:param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
340
|
+
:param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
341
|
+
:param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
341
342
|
:param pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationShowOutputArgs']]] show_outputs: Outputs the result of `SHOW SECURITY INTEGRATION` for the given integration.
|
|
342
343
|
"""
|
|
343
344
|
if allowed_email_patterns is not None:
|
|
@@ -383,38 +384,38 @@ class _Saml2IntegrationState:
|
|
|
383
384
|
|
|
384
385
|
@property
|
|
385
386
|
@pulumi.getter(name="allowedEmailPatterns")
|
|
386
|
-
def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
387
|
+
def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
|
387
388
|
"""
|
|
388
389
|
A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
389
390
|
"""
|
|
390
391
|
return pulumi.get(self, "allowed_email_patterns")
|
|
391
392
|
|
|
392
393
|
@allowed_email_patterns.setter
|
|
393
|
-
def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
394
|
+
def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
|
394
395
|
pulumi.set(self, "allowed_email_patterns", value)
|
|
395
396
|
|
|
396
397
|
@property
|
|
397
398
|
@pulumi.getter(name="allowedUserDomains")
|
|
398
|
-
def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
399
|
+
def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
|
399
400
|
"""
|
|
400
401
|
A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
401
402
|
"""
|
|
402
403
|
return pulumi.get(self, "allowed_user_domains")
|
|
403
404
|
|
|
404
405
|
@allowed_user_domains.setter
|
|
405
|
-
def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
406
|
+
def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
|
406
407
|
pulumi.set(self, "allowed_user_domains", value)
|
|
407
408
|
|
|
408
409
|
@property
|
|
409
410
|
@pulumi.getter
|
|
410
|
-
def comment(self) -> Optional[pulumi.Input[str]]:
|
|
411
|
+
def comment(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
411
412
|
"""
|
|
412
413
|
Specifies a comment for the integration.
|
|
413
414
|
"""
|
|
414
415
|
return pulumi.get(self, "comment")
|
|
415
416
|
|
|
416
417
|
@comment.setter
|
|
417
|
-
def comment(self, value: Optional[pulumi.Input[str]]):
|
|
418
|
+
def comment(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
418
419
|
pulumi.set(self, "comment", value)
|
|
419
420
|
|
|
420
421
|
@property
|
|
@@ -431,182 +432,182 @@ class _Saml2IntegrationState:
|
|
|
431
432
|
|
|
432
433
|
@property
|
|
433
434
|
@pulumi.getter
|
|
434
|
-
def enabled(self) -> Optional[pulumi.Input[str]]:
|
|
435
|
+
def enabled(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
435
436
|
"""
|
|
436
437
|
Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
437
438
|
"""
|
|
438
439
|
return pulumi.get(self, "enabled")
|
|
439
440
|
|
|
440
441
|
@enabled.setter
|
|
441
|
-
def enabled(self, value: Optional[pulumi.Input[str]]):
|
|
442
|
+
def enabled(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
442
443
|
pulumi.set(self, "enabled", value)
|
|
443
444
|
|
|
444
445
|
@property
|
|
445
446
|
@pulumi.getter(name="fullyQualifiedName")
|
|
446
|
-
def fully_qualified_name(self) -> Optional[pulumi.Input[str]]:
|
|
447
|
+
def fully_qualified_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
447
448
|
"""
|
|
448
449
|
Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
|
|
449
450
|
"""
|
|
450
451
|
return pulumi.get(self, "fully_qualified_name")
|
|
451
452
|
|
|
452
453
|
@fully_qualified_name.setter
|
|
453
|
-
def fully_qualified_name(self, value: Optional[pulumi.Input[str]]):
|
|
454
|
+
def fully_qualified_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
454
455
|
pulumi.set(self, "fully_qualified_name", value)
|
|
455
456
|
|
|
456
457
|
@property
|
|
457
458
|
@pulumi.getter
|
|
458
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
459
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
459
460
|
"""
|
|
460
461
|
Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
461
462
|
"""
|
|
462
463
|
return pulumi.get(self, "name")
|
|
463
464
|
|
|
464
465
|
@name.setter
|
|
465
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
466
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
466
467
|
pulumi.set(self, "name", value)
|
|
467
468
|
|
|
468
469
|
@property
|
|
469
470
|
@pulumi.getter(name="saml2EnableSpInitiated")
|
|
470
|
-
def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[str]]:
|
|
471
|
+
def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
471
472
|
"""
|
|
472
473
|
The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
473
474
|
"""
|
|
474
475
|
return pulumi.get(self, "saml2_enable_sp_initiated")
|
|
475
476
|
|
|
476
477
|
@saml2_enable_sp_initiated.setter
|
|
477
|
-
def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[str]]):
|
|
478
|
+
def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
478
479
|
pulumi.set(self, "saml2_enable_sp_initiated", value)
|
|
479
480
|
|
|
480
481
|
@property
|
|
481
482
|
@pulumi.getter(name="saml2ForceAuthn")
|
|
482
|
-
def saml2_force_authn(self) -> Optional[pulumi.Input[str]]:
|
|
483
|
+
def saml2_force_authn(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
483
484
|
"""
|
|
484
485
|
The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
485
486
|
"""
|
|
486
487
|
return pulumi.get(self, "saml2_force_authn")
|
|
487
488
|
|
|
488
489
|
@saml2_force_authn.setter
|
|
489
|
-
def saml2_force_authn(self, value: Optional[pulumi.Input[str]]):
|
|
490
|
+
def saml2_force_authn(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
490
491
|
pulumi.set(self, "saml2_force_authn", value)
|
|
491
492
|
|
|
492
493
|
@property
|
|
493
494
|
@pulumi.getter(name="saml2Issuer")
|
|
494
|
-
def saml2_issuer(self) -> Optional[pulumi.Input[str]]:
|
|
495
|
+
def saml2_issuer(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
495
496
|
"""
|
|
496
497
|
The string containing the IdP EntityID / Issuer.
|
|
497
498
|
"""
|
|
498
499
|
return pulumi.get(self, "saml2_issuer")
|
|
499
500
|
|
|
500
501
|
@saml2_issuer.setter
|
|
501
|
-
def saml2_issuer(self, value: Optional[pulumi.Input[str]]):
|
|
502
|
+
def saml2_issuer(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
502
503
|
pulumi.set(self, "saml2_issuer", value)
|
|
503
504
|
|
|
504
505
|
@property
|
|
505
506
|
@pulumi.getter(name="saml2PostLogoutRedirectUrl")
|
|
506
|
-
def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
|
|
507
|
+
def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
507
508
|
"""
|
|
508
509
|
The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
509
510
|
"""
|
|
510
511
|
return pulumi.get(self, "saml2_post_logout_redirect_url")
|
|
511
512
|
|
|
512
513
|
@saml2_post_logout_redirect_url.setter
|
|
513
|
-
def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
|
|
514
|
+
def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
514
515
|
pulumi.set(self, "saml2_post_logout_redirect_url", value)
|
|
515
516
|
|
|
516
517
|
@property
|
|
517
518
|
@pulumi.getter(name="saml2Provider")
|
|
518
|
-
def saml2_provider(self) -> Optional[pulumi.Input[str]]:
|
|
519
|
+
def saml2_provider(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
519
520
|
"""
|
|
520
521
|
The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
521
522
|
"""
|
|
522
523
|
return pulumi.get(self, "saml2_provider")
|
|
523
524
|
|
|
524
525
|
@saml2_provider.setter
|
|
525
|
-
def saml2_provider(self, value: Optional[pulumi.Input[str]]):
|
|
526
|
+
def saml2_provider(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
526
527
|
pulumi.set(self, "saml2_provider", value)
|
|
527
528
|
|
|
528
529
|
@property
|
|
529
530
|
@pulumi.getter(name="saml2RequestedNameidFormat")
|
|
530
|
-
def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
|
|
531
|
+
def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
531
532
|
"""
|
|
532
533
|
The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
533
534
|
"""
|
|
534
535
|
return pulumi.get(self, "saml2_requested_nameid_format")
|
|
535
536
|
|
|
536
537
|
@saml2_requested_nameid_format.setter
|
|
537
|
-
def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
|
|
538
|
+
def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
538
539
|
pulumi.set(self, "saml2_requested_nameid_format", value)
|
|
539
540
|
|
|
540
541
|
@property
|
|
541
542
|
@pulumi.getter(name="saml2SignRequest")
|
|
542
|
-
def saml2_sign_request(self) -> Optional[pulumi.Input[str]]:
|
|
543
|
+
def saml2_sign_request(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
543
544
|
"""
|
|
544
545
|
The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
545
546
|
"""
|
|
546
547
|
return pulumi.get(self, "saml2_sign_request")
|
|
547
548
|
|
|
548
549
|
@saml2_sign_request.setter
|
|
549
|
-
def saml2_sign_request(self, value: Optional[pulumi.Input[str]]):
|
|
550
|
+
def saml2_sign_request(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
550
551
|
pulumi.set(self, "saml2_sign_request", value)
|
|
551
552
|
|
|
552
553
|
@property
|
|
553
554
|
@pulumi.getter(name="saml2SnowflakeAcsUrl")
|
|
554
|
-
def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
|
|
555
|
+
def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
555
556
|
"""
|
|
556
557
|
The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
557
558
|
"""
|
|
558
559
|
return pulumi.get(self, "saml2_snowflake_acs_url")
|
|
559
560
|
|
|
560
561
|
@saml2_snowflake_acs_url.setter
|
|
561
|
-
def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
|
|
562
|
+
def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
562
563
|
pulumi.set(self, "saml2_snowflake_acs_url", value)
|
|
563
564
|
|
|
564
565
|
@property
|
|
565
566
|
@pulumi.getter(name="saml2SnowflakeIssuerUrl")
|
|
566
|
-
def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
|
|
567
|
+
def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
567
568
|
"""
|
|
568
569
|
The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
569
570
|
"""
|
|
570
571
|
return pulumi.get(self, "saml2_snowflake_issuer_url")
|
|
571
572
|
|
|
572
573
|
@saml2_snowflake_issuer_url.setter
|
|
573
|
-
def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
|
|
574
|
+
def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
574
575
|
pulumi.set(self, "saml2_snowflake_issuer_url", value)
|
|
575
576
|
|
|
576
577
|
@property
|
|
577
578
|
@pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
|
|
578
|
-
def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
|
|
579
|
+
def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
579
580
|
"""
|
|
580
581
|
The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
581
582
|
"""
|
|
582
583
|
return pulumi.get(self, "saml2_sp_initiated_login_page_label")
|
|
583
584
|
|
|
584
585
|
@saml2_sp_initiated_login_page_label.setter
|
|
585
|
-
def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
|
|
586
|
+
def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
586
587
|
pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
|
|
587
588
|
|
|
588
589
|
@property
|
|
589
590
|
@pulumi.getter(name="saml2SsoUrl")
|
|
590
|
-
def saml2_sso_url(self) -> Optional[pulumi.Input[str]]:
|
|
591
|
+
def saml2_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
591
592
|
"""
|
|
592
593
|
The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
593
594
|
"""
|
|
594
595
|
return pulumi.get(self, "saml2_sso_url")
|
|
595
596
|
|
|
596
597
|
@saml2_sso_url.setter
|
|
597
|
-
def saml2_sso_url(self, value: Optional[pulumi.Input[str]]):
|
|
598
|
+
def saml2_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
598
599
|
pulumi.set(self, "saml2_sso_url", value)
|
|
599
600
|
|
|
600
601
|
@property
|
|
601
602
|
@pulumi.getter(name="saml2X509Cert")
|
|
602
|
-
def saml2_x509_cert(self) -> Optional[pulumi.Input[str]]:
|
|
603
|
+
def saml2_x509_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
603
604
|
"""
|
|
604
605
|
The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
605
606
|
"""
|
|
606
607
|
return pulumi.get(self, "saml2_x509_cert")
|
|
607
608
|
|
|
608
609
|
@saml2_x509_cert.setter
|
|
609
|
-
def saml2_x509_cert(self, value: Optional[pulumi.Input[str]]):
|
|
610
|
+
def saml2_x509_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
610
611
|
pulumi.set(self, "saml2_x509_cert", value)
|
|
611
612
|
|
|
612
613
|
@property
|
|
@@ -627,23 +628,23 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
627
628
|
def __init__(__self__,
|
|
628
629
|
resource_name: str,
|
|
629
630
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
630
|
-
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
631
|
-
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
632
|
-
comment: Optional[pulumi.Input[str]] = None,
|
|
633
|
-
enabled: Optional[pulumi.Input[str]] = None,
|
|
634
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
635
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
|
|
636
|
-
saml2_force_authn: Optional[pulumi.Input[str]] = None,
|
|
637
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
638
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
639
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
640
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
641
|
-
saml2_sign_request: Optional[pulumi.Input[str]] = None,
|
|
642
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
643
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
644
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
645
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
646
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
631
|
+
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
632
|
+
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
633
|
+
comment: Optional[pulumi.Input[builtins.str]] = None,
|
|
634
|
+
enabled: Optional[pulumi.Input[builtins.str]] = None,
|
|
635
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
636
|
+
saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
|
|
637
|
+
saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
|
|
638
|
+
saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
|
|
639
|
+
saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
640
|
+
saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
|
|
641
|
+
saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
|
|
642
|
+
saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
|
|
643
|
+
saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
644
|
+
saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
645
|
+
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
|
|
646
|
+
saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
647
|
+
saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
|
|
647
648
|
__props__=None):
|
|
648
649
|
"""
|
|
649
650
|
## Import
|
|
@@ -654,23 +655,23 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
654
655
|
|
|
655
656
|
:param str resource_name: The name of the resource.
|
|
656
657
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
657
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
658
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
659
|
-
:param pulumi.Input[str] comment: Specifies a comment for the integration.
|
|
660
|
-
:param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
661
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
662
|
-
:param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
663
|
-
:param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
664
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
665
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
666
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
667
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
668
|
-
:param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
669
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
670
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
671
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
672
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
673
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
658
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
659
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
660
|
+
:param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
|
|
661
|
+
:param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
662
|
+
:param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
663
|
+
:param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
664
|
+
:param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
665
|
+
:param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
666
|
+
:param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
667
|
+
:param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
668
|
+
:param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
669
|
+
:param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
670
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
671
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
672
|
+
:param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
673
|
+
:param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
674
|
+
:param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
674
675
|
"""
|
|
675
676
|
...
|
|
676
677
|
@overload
|
|
@@ -700,23 +701,23 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
700
701
|
def _internal_init(__self__,
|
|
701
702
|
resource_name: str,
|
|
702
703
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
703
|
-
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
704
|
-
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
705
|
-
comment: Optional[pulumi.Input[str]] = None,
|
|
706
|
-
enabled: Optional[pulumi.Input[str]] = None,
|
|
707
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
708
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
|
|
709
|
-
saml2_force_authn: Optional[pulumi.Input[str]] = None,
|
|
710
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
711
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
712
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
713
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
714
|
-
saml2_sign_request: Optional[pulumi.Input[str]] = None,
|
|
715
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
716
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
717
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
718
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
719
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
704
|
+
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
705
|
+
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
706
|
+
comment: Optional[pulumi.Input[builtins.str]] = None,
|
|
707
|
+
enabled: Optional[pulumi.Input[builtins.str]] = None,
|
|
708
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
709
|
+
saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
|
|
710
|
+
saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
|
|
711
|
+
saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
|
|
712
|
+
saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
713
|
+
saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
|
|
714
|
+
saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
|
|
715
|
+
saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
|
|
716
|
+
saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
717
|
+
saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
718
|
+
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
|
|
719
|
+
saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
720
|
+
saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
|
|
720
721
|
__props__=None):
|
|
721
722
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
722
723
|
if not isinstance(opts, pulumi.ResourceOptions):
|
|
@@ -764,25 +765,25 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
764
765
|
def get(resource_name: str,
|
|
765
766
|
id: pulumi.Input[str],
|
|
766
767
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
767
|
-
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
768
|
-
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
769
|
-
comment: Optional[pulumi.Input[str]] = None,
|
|
768
|
+
allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
769
|
+
allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
|
770
|
+
comment: Optional[pulumi.Input[builtins.str]] = None,
|
|
770
771
|
describe_outputs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationDescribeOutputArgs', 'Saml2IntegrationDescribeOutputArgsDict']]]]] = None,
|
|
771
|
-
enabled: Optional[pulumi.Input[str]] = None,
|
|
772
|
-
fully_qualified_name: Optional[pulumi.Input[str]] = None,
|
|
773
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
774
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
|
|
775
|
-
saml2_force_authn: Optional[pulumi.Input[str]] = None,
|
|
776
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
777
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
778
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
779
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
780
|
-
saml2_sign_request: Optional[pulumi.Input[str]] = None,
|
|
781
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
782
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
783
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
784
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
785
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
772
|
+
enabled: Optional[pulumi.Input[builtins.str]] = None,
|
|
773
|
+
fully_qualified_name: Optional[pulumi.Input[builtins.str]] = None,
|
|
774
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
775
|
+
saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
|
|
776
|
+
saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
|
|
777
|
+
saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
|
|
778
|
+
saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
779
|
+
saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
|
|
780
|
+
saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
|
|
781
|
+
saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
|
|
782
|
+
saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
783
|
+
saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
784
|
+
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
|
|
785
|
+
saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
|
786
|
+
saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
|
|
786
787
|
show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationShowOutputArgs', 'Saml2IntegrationShowOutputArgsDict']]]]] = None) -> 'Saml2Integration':
|
|
787
788
|
"""
|
|
788
789
|
Get an existing Saml2Integration resource's state with the given name, id, and optional extra
|
|
@@ -791,25 +792,25 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
791
792
|
:param str resource_name: The unique name of the resulting resource.
|
|
792
793
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
793
794
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
794
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
795
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
796
|
-
:param pulumi.Input[str] comment: Specifies a comment for the integration.
|
|
795
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
796
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
797
|
+
:param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
|
|
797
798
|
:param pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationDescribeOutputArgs', 'Saml2IntegrationDescribeOutputArgsDict']]]] describe_outputs: Outputs the result of `DESCRIBE SECURITY INTEGRATION` for the given integration.
|
|
798
|
-
:param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
799
|
-
:param pulumi.Input[str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
|
|
800
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
801
|
-
:param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
802
|
-
:param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
803
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
804
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
805
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
806
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
807
|
-
:param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
808
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
809
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
810
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
811
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
812
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
799
|
+
:param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
800
|
+
:param pulumi.Input[builtins.str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
|
|
801
|
+
:param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
802
|
+
:param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
803
|
+
:param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
804
|
+
:param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
805
|
+
:param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
806
|
+
:param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
807
|
+
:param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
808
|
+
:param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
809
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
810
|
+
:param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
811
|
+
:param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
812
|
+
:param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
813
|
+
:param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
813
814
|
:param pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationShowOutputArgs', 'Saml2IntegrationShowOutputArgsDict']]]] show_outputs: Outputs the result of `SHOW SECURITY INTEGRATION` for the given integration.
|
|
814
815
|
"""
|
|
815
816
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
@@ -840,7 +841,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
840
841
|
|
|
841
842
|
@property
|
|
842
843
|
@pulumi.getter(name="allowedEmailPatterns")
|
|
843
|
-
def allowed_email_patterns(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
844
|
+
def allowed_email_patterns(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
|
844
845
|
"""
|
|
845
846
|
A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
846
847
|
"""
|
|
@@ -848,7 +849,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
848
849
|
|
|
849
850
|
@property
|
|
850
851
|
@pulumi.getter(name="allowedUserDomains")
|
|
851
|
-
def allowed_user_domains(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
852
|
+
def allowed_user_domains(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
|
852
853
|
"""
|
|
853
854
|
A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
854
855
|
"""
|
|
@@ -856,7 +857,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
856
857
|
|
|
857
858
|
@property
|
|
858
859
|
@pulumi.getter
|
|
859
|
-
def comment(self) -> pulumi.Output[Optional[str]]:
|
|
860
|
+
def comment(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
860
861
|
"""
|
|
861
862
|
Specifies a comment for the integration.
|
|
862
863
|
"""
|
|
@@ -872,7 +873,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
872
873
|
|
|
873
874
|
@property
|
|
874
875
|
@pulumi.getter
|
|
875
|
-
def enabled(self) -> pulumi.Output[Optional[str]]:
|
|
876
|
+
def enabled(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
876
877
|
"""
|
|
877
878
|
Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
878
879
|
"""
|
|
@@ -880,7 +881,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
880
881
|
|
|
881
882
|
@property
|
|
882
883
|
@pulumi.getter(name="fullyQualifiedName")
|
|
883
|
-
def fully_qualified_name(self) -> pulumi.Output[str]:
|
|
884
|
+
def fully_qualified_name(self) -> pulumi.Output[builtins.str]:
|
|
884
885
|
"""
|
|
885
886
|
Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
|
|
886
887
|
"""
|
|
@@ -888,7 +889,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
888
889
|
|
|
889
890
|
@property
|
|
890
891
|
@pulumi.getter
|
|
891
|
-
def name(self) -> pulumi.Output[str]:
|
|
892
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
|
892
893
|
"""
|
|
893
894
|
Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
|
|
894
895
|
"""
|
|
@@ -896,7 +897,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
896
897
|
|
|
897
898
|
@property
|
|
898
899
|
@pulumi.getter(name="saml2EnableSpInitiated")
|
|
899
|
-
def saml2_enable_sp_initiated(self) -> pulumi.Output[Optional[str]]:
|
|
900
|
+
def saml2_enable_sp_initiated(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
900
901
|
"""
|
|
901
902
|
The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
902
903
|
"""
|
|
@@ -904,7 +905,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
904
905
|
|
|
905
906
|
@property
|
|
906
907
|
@pulumi.getter(name="saml2ForceAuthn")
|
|
907
|
-
def saml2_force_authn(self) -> pulumi.Output[Optional[str]]:
|
|
908
|
+
def saml2_force_authn(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
908
909
|
"""
|
|
909
910
|
The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
910
911
|
"""
|
|
@@ -912,7 +913,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
912
913
|
|
|
913
914
|
@property
|
|
914
915
|
@pulumi.getter(name="saml2Issuer")
|
|
915
|
-
def saml2_issuer(self) -> pulumi.Output[str]:
|
|
916
|
+
def saml2_issuer(self) -> pulumi.Output[builtins.str]:
|
|
916
917
|
"""
|
|
917
918
|
The string containing the IdP EntityID / Issuer.
|
|
918
919
|
"""
|
|
@@ -920,7 +921,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
920
921
|
|
|
921
922
|
@property
|
|
922
923
|
@pulumi.getter(name="saml2PostLogoutRedirectUrl")
|
|
923
|
-
def saml2_post_logout_redirect_url(self) -> pulumi.Output[Optional[str]]:
|
|
924
|
+
def saml2_post_logout_redirect_url(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
924
925
|
"""
|
|
925
926
|
The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
926
927
|
"""
|
|
@@ -928,7 +929,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
928
929
|
|
|
929
930
|
@property
|
|
930
931
|
@pulumi.getter(name="saml2Provider")
|
|
931
|
-
def saml2_provider(self) -> pulumi.Output[str]:
|
|
932
|
+
def saml2_provider(self) -> pulumi.Output[builtins.str]:
|
|
932
933
|
"""
|
|
933
934
|
The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
|
|
934
935
|
"""
|
|
@@ -936,7 +937,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
936
937
|
|
|
937
938
|
@property
|
|
938
939
|
@pulumi.getter(name="saml2RequestedNameidFormat")
|
|
939
|
-
def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[str]]:
|
|
940
|
+
def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
940
941
|
"""
|
|
941
942
|
The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
|
|
942
943
|
"""
|
|
@@ -944,7 +945,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
944
945
|
|
|
945
946
|
@property
|
|
946
947
|
@pulumi.getter(name="saml2SignRequest")
|
|
947
|
-
def saml2_sign_request(self) -> pulumi.Output[Optional[str]]:
|
|
948
|
+
def saml2_sign_request(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
948
949
|
"""
|
|
949
950
|
The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
|
|
950
951
|
"""
|
|
@@ -952,7 +953,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
952
953
|
|
|
953
954
|
@property
|
|
954
955
|
@pulumi.getter(name="saml2SnowflakeAcsUrl")
|
|
955
|
-
def saml2_snowflake_acs_url(self) -> pulumi.Output[Optional[str]]:
|
|
956
|
+
def saml2_snowflake_acs_url(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
956
957
|
"""
|
|
957
958
|
The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
958
959
|
"""
|
|
@@ -960,7 +961,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
960
961
|
|
|
961
962
|
@property
|
|
962
963
|
@pulumi.getter(name="saml2SnowflakeIssuerUrl")
|
|
963
|
-
def saml2_snowflake_issuer_url(self) -> pulumi.Output[Optional[str]]:
|
|
964
|
+
def saml2_snowflake_issuer_url(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
964
965
|
"""
|
|
965
966
|
The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
|
|
966
967
|
"""
|
|
@@ -968,7 +969,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
968
969
|
|
|
969
970
|
@property
|
|
970
971
|
@pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
|
|
971
|
-
def saml2_sp_initiated_login_page_label(self) -> pulumi.Output[Optional[str]]:
|
|
972
|
+
def saml2_sp_initiated_login_page_label(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
972
973
|
"""
|
|
973
974
|
The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
|
|
974
975
|
"""
|
|
@@ -976,7 +977,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
976
977
|
|
|
977
978
|
@property
|
|
978
979
|
@pulumi.getter(name="saml2SsoUrl")
|
|
979
|
-
def saml2_sso_url(self) -> pulumi.Output[str]:
|
|
980
|
+
def saml2_sso_url(self) -> pulumi.Output[builtins.str]:
|
|
980
981
|
"""
|
|
981
982
|
The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
982
983
|
"""
|
|
@@ -984,7 +985,7 @@ class Saml2Integration(pulumi.CustomResource):
|
|
|
984
985
|
|
|
985
986
|
@property
|
|
986
987
|
@pulumi.getter(name="saml2X509Cert")
|
|
987
|
-
def saml2_x509_cert(self) -> pulumi.Output[str]:
|
|
988
|
+
def saml2_x509_cert(self) -> pulumi.Output[builtins.str]:
|
|
988
989
|
"""
|
|
989
990
|
The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
990
991
|
"""
|