pulumi-snowflake 1.2.0a1743575514__py3-none-any.whl → 1.2.0a1744183688__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-snowflake might be problematic. Click here for more details.

Files changed (147) hide show
  1. pulumi_snowflake/__init__.py +1 -0
  2. pulumi_snowflake/_inputs.py +12288 -12287
  3. pulumi_snowflake/account.py +186 -185
  4. pulumi_snowflake/account_authentication_policy_attachment.py +15 -14
  5. pulumi_snowflake/account_parameter.py +29 -28
  6. pulumi_snowflake/account_password_policy_attachment.py +15 -14
  7. pulumi_snowflake/account_role.py +32 -31
  8. pulumi_snowflake/alert.py +120 -119
  9. pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +158 -157
  10. pulumi_snowflake/api_authentication_integration_with_client_credentials.py +144 -143
  11. pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +154 -153
  12. pulumi_snowflake/api_integration.py +203 -202
  13. pulumi_snowflake/authentication_policy.py +134 -133
  14. pulumi_snowflake/config/__init__.py +1 -0
  15. pulumi_snowflake/config/__init__.pyi +1 -0
  16. pulumi_snowflake/config/outputs.py +16 -15
  17. pulumi_snowflake/config/vars.py +1 -0
  18. pulumi_snowflake/cortex_search_service.py +141 -140
  19. pulumi_snowflake/database.py +288 -287
  20. pulumi_snowflake/database_role.py +50 -49
  21. pulumi_snowflake/dynamic_table.py +218 -217
  22. pulumi_snowflake/email_notification_integration.py +56 -55
  23. pulumi_snowflake/execute.py +50 -49
  24. pulumi_snowflake/external_function.py +225 -224
  25. pulumi_snowflake/external_oauth_integration.py +232 -231
  26. pulumi_snowflake/external_table.py +197 -196
  27. pulumi_snowflake/external_volume.py +50 -49
  28. pulumi_snowflake/failover_group.py +106 -105
  29. pulumi_snowflake/file_format.py +512 -511
  30. pulumi_snowflake/function_java.py +249 -248
  31. pulumi_snowflake/function_javascript.py +193 -192
  32. pulumi_snowflake/function_python.py +263 -262
  33. pulumi_snowflake/function_scala.py +249 -248
  34. pulumi_snowflake/function_sql.py +179 -178
  35. pulumi_snowflake/get_account_roles.py +12 -11
  36. pulumi_snowflake/get_accounts.py +12 -11
  37. pulumi_snowflake/get_alerts.py +17 -16
  38. pulumi_snowflake/get_connections.py +7 -6
  39. pulumi_snowflake/get_cortex_search_services.py +12 -11
  40. pulumi_snowflake/get_current_account.py +5 -4
  41. pulumi_snowflake/get_current_role.py +3 -2
  42. pulumi_snowflake/get_database.py +15 -14
  43. pulumi_snowflake/get_database_role.py +14 -13
  44. pulumi_snowflake/get_database_roles.py +12 -11
  45. pulumi_snowflake/get_databases.py +22 -21
  46. pulumi_snowflake/get_dynamic_tables.py +7 -6
  47. pulumi_snowflake/get_external_functions.py +12 -11
  48. pulumi_snowflake/get_external_tables.py +12 -11
  49. pulumi_snowflake/get_failover_groups.py +7 -6
  50. pulumi_snowflake/get_file_formats.py +12 -11
  51. pulumi_snowflake/get_functions.py +12 -11
  52. pulumi_snowflake/get_grants.py +2 -1
  53. pulumi_snowflake/get_masking_policies.py +12 -11
  54. pulumi_snowflake/get_materialized_views.py +12 -11
  55. pulumi_snowflake/get_network_policies.py +12 -11
  56. pulumi_snowflake/get_parameters.py +27 -26
  57. pulumi_snowflake/get_pipes.py +12 -11
  58. pulumi_snowflake/get_procedures.py +12 -11
  59. pulumi_snowflake/get_resource_monitors.py +7 -6
  60. pulumi_snowflake/get_row_access_policies.py +12 -11
  61. pulumi_snowflake/get_schemas.py +22 -21
  62. pulumi_snowflake/get_secrets.py +12 -11
  63. pulumi_snowflake/get_security_integrations.py +12 -11
  64. pulumi_snowflake/get_sequences.py +12 -11
  65. pulumi_snowflake/get_shares.py +7 -6
  66. pulumi_snowflake/get_stages.py +12 -11
  67. pulumi_snowflake/get_storage_integrations.py +2 -1
  68. pulumi_snowflake/get_streamlits.py +12 -11
  69. pulumi_snowflake/get_streams.py +17 -16
  70. pulumi_snowflake/get_system_generate_scim_access_token.py +8 -7
  71. pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +8 -7
  72. pulumi_snowflake/get_system_get_private_link_config.py +11 -10
  73. pulumi_snowflake/get_system_get_snowflake_platform_info.py +4 -3
  74. pulumi_snowflake/get_tables.py +12 -11
  75. pulumi_snowflake/get_tags.py +7 -6
  76. pulumi_snowflake/get_tasks.py +22 -21
  77. pulumi_snowflake/get_users.py +22 -21
  78. pulumi_snowflake/get_views.py +17 -16
  79. pulumi_snowflake/get_warehouses.py +17 -16
  80. pulumi_snowflake/grant_account_role.py +43 -42
  81. pulumi_snowflake/grant_application_role.py +43 -42
  82. pulumi_snowflake/grant_database_role.py +57 -56
  83. pulumi_snowflake/grant_ownership.py +43 -42
  84. pulumi_snowflake/grant_privileges_to_account_role.py +95 -94
  85. pulumi_snowflake/grant_privileges_to_database_role.py +95 -94
  86. pulumi_snowflake/grant_privileges_to_share.py +127 -126
  87. pulumi_snowflake/legacy_service_user.py +1039 -1038
  88. pulumi_snowflake/managed_account.py +113 -112
  89. pulumi_snowflake/masking_policy.py +106 -105
  90. pulumi_snowflake/materialized_view.py +120 -119
  91. pulumi_snowflake/network_policy.py +92 -91
  92. pulumi_snowflake/network_policy_attachment.py +43 -42
  93. pulumi_snowflake/network_rule.py +106 -105
  94. pulumi_snowflake/notification_integration.py +238 -237
  95. pulumi_snowflake/oauth_integration_for_custom_clients.py +210 -209
  96. pulumi_snowflake/oauth_integration_for_partner_applications.py +134 -133
  97. pulumi_snowflake/object_parameter.py +57 -56
  98. pulumi_snowflake/outputs.py +9273 -9272
  99. pulumi_snowflake/password_policy.py +246 -245
  100. pulumi_snowflake/pipe.py +148 -147
  101. pulumi_snowflake/primary_connection.py +55 -54
  102. pulumi_snowflake/procedure_java.py +267 -266
  103. pulumi_snowflake/procedure_javascript.py +197 -196
  104. pulumi_snowflake/procedure_python.py +267 -266
  105. pulumi_snowflake/procedure_scala.py +267 -266
  106. pulumi_snowflake/procedure_sql.py +197 -196
  107. pulumi_snowflake/provider.py +303 -302
  108. pulumi_snowflake/pulumi-plugin.json +1 -1
  109. pulumi_snowflake/resource_monitor.py +134 -133
  110. pulumi_snowflake/row_access_policy.py +78 -77
  111. pulumi_snowflake/saml2_integration.py +246 -245
  112. pulumi_snowflake/schema.py +316 -315
  113. pulumi_snowflake/scim_integration.py +106 -105
  114. pulumi_snowflake/secondary_connection.py +57 -56
  115. pulumi_snowflake/secondary_database.py +288 -287
  116. pulumi_snowflake/secret_with_authorization_code_grant.py +109 -108
  117. pulumi_snowflake/secret_with_basic_authentication.py +95 -94
  118. pulumi_snowflake/secret_with_client_credentials.py +99 -98
  119. pulumi_snowflake/secret_with_generic_string.py +81 -80
  120. pulumi_snowflake/sequence.py +99 -98
  121. pulumi_snowflake/service_user.py +1015 -1014
  122. pulumi_snowflake/share.py +50 -49
  123. pulumi_snowflake/shared_database.py +246 -245
  124. pulumi_snowflake/stage.py +190 -189
  125. pulumi_snowflake/storage_integration.py +166 -165
  126. pulumi_snowflake/stream_on_directory_table.py +100 -99
  127. pulumi_snowflake/stream_on_external_table.py +114 -113
  128. pulumi_snowflake/stream_on_table.py +124 -123
  129. pulumi_snowflake/stream_on_view.py +124 -123
  130. pulumi_snowflake/streamlit.py +148 -147
  131. pulumi_snowflake/table.py +113 -112
  132. pulumi_snowflake/table_column_masking_policy_application.py +43 -42
  133. pulumi_snowflake/table_constraint.py +155 -154
  134. pulumi_snowflake/tag.py +92 -91
  135. pulumi_snowflake/tag_association.py +71 -70
  136. pulumi_snowflake/task.py +1002 -1001
  137. pulumi_snowflake/user.py +1101 -1100
  138. pulumi_snowflake/user_authentication_policy_attachment.py +29 -28
  139. pulumi_snowflake/user_password_policy_attachment.py +29 -28
  140. pulumi_snowflake/user_public_keys.py +43 -42
  141. pulumi_snowflake/view.py +136 -135
  142. pulumi_snowflake/warehouse.py +232 -231
  143. {pulumi_snowflake-1.2.0a1743575514.dist-info → pulumi_snowflake-1.2.0a1744183688.dist-info}/METADATA +1 -1
  144. pulumi_snowflake-1.2.0a1744183688.dist-info/RECORD +148 -0
  145. pulumi_snowflake-1.2.0a1743575514.dist-info/RECORD +0 -148
  146. {pulumi_snowflake-1.2.0a1743575514.dist-info → pulumi_snowflake-1.2.0a1744183688.dist-info}/WHEEL +0 -0
  147. {pulumi_snowflake-1.2.0a1743575514.dist-info → pulumi_snowflake-1.2.0a1744183688.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,42 +22,42 @@ __all__ = ['Saml2IntegrationArgs', 'Saml2Integration']
21
22
  @pulumi.input_type
22
23
  class Saml2IntegrationArgs:
23
24
  def __init__(__self__, *,
24
- saml2_issuer: pulumi.Input[str],
25
- saml2_provider: pulumi.Input[str],
26
- saml2_sso_url: pulumi.Input[str],
27
- saml2_x509_cert: pulumi.Input[str],
28
- allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
29
- allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
- comment: Optional[pulumi.Input[str]] = None,
31
- enabled: Optional[pulumi.Input[str]] = None,
32
- name: Optional[pulumi.Input[str]] = None,
33
- saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
34
- saml2_force_authn: Optional[pulumi.Input[str]] = None,
35
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
36
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
37
- saml2_sign_request: Optional[pulumi.Input[str]] = None,
38
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
39
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
40
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None):
25
+ saml2_issuer: pulumi.Input[builtins.str],
26
+ saml2_provider: pulumi.Input[builtins.str],
27
+ saml2_sso_url: pulumi.Input[builtins.str],
28
+ saml2_x509_cert: pulumi.Input[builtins.str],
29
+ allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
30
+ allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
+ comment: Optional[pulumi.Input[builtins.str]] = None,
32
+ enabled: Optional[pulumi.Input[builtins.str]] = None,
33
+ name: Optional[pulumi.Input[builtins.str]] = None,
34
+ saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
35
+ saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
36
+ saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
37
+ saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
38
+ saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
39
+ saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
40
+ saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
41
+ saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None):
41
42
  """
42
43
  The set of arguments for constructing a Saml2Integration resource.
43
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
44
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
45
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
46
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
47
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
48
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
49
- :param pulumi.Input[str] comment: Specifies a comment for the integration.
50
- :param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
51
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
52
- :param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
53
- :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
54
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
55
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
56
- :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
57
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
58
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
59
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
44
+ :param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
45
+ :param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
46
+ :param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
47
+ :param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
48
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
49
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
50
+ :param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
51
+ :param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
52
+ :param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
53
+ :param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
54
+ :param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
55
+ :param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
56
+ :param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
57
+ :param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
58
+ :param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
59
+ :param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
60
+ :param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
60
61
  """
61
62
  pulumi.set(__self__, "saml2_issuer", saml2_issuer)
62
63
  pulumi.set(__self__, "saml2_provider", saml2_provider)
@@ -91,253 +92,253 @@ class Saml2IntegrationArgs:
91
92
 
92
93
  @property
93
94
  @pulumi.getter(name="saml2Issuer")
94
- def saml2_issuer(self) -> pulumi.Input[str]:
95
+ def saml2_issuer(self) -> pulumi.Input[builtins.str]:
95
96
  """
96
97
  The string containing the IdP EntityID / Issuer.
97
98
  """
98
99
  return pulumi.get(self, "saml2_issuer")
99
100
 
100
101
  @saml2_issuer.setter
101
- def saml2_issuer(self, value: pulumi.Input[str]):
102
+ def saml2_issuer(self, value: pulumi.Input[builtins.str]):
102
103
  pulumi.set(self, "saml2_issuer", value)
103
104
 
104
105
  @property
105
106
  @pulumi.getter(name="saml2Provider")
106
- def saml2_provider(self) -> pulumi.Input[str]:
107
+ def saml2_provider(self) -> pulumi.Input[builtins.str]:
107
108
  """
108
109
  The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
109
110
  """
110
111
  return pulumi.get(self, "saml2_provider")
111
112
 
112
113
  @saml2_provider.setter
113
- def saml2_provider(self, value: pulumi.Input[str]):
114
+ def saml2_provider(self, value: pulumi.Input[builtins.str]):
114
115
  pulumi.set(self, "saml2_provider", value)
115
116
 
116
117
  @property
117
118
  @pulumi.getter(name="saml2SsoUrl")
118
- def saml2_sso_url(self) -> pulumi.Input[str]:
119
+ def saml2_sso_url(self) -> pulumi.Input[builtins.str]:
119
120
  """
120
121
  The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
121
122
  """
122
123
  return pulumi.get(self, "saml2_sso_url")
123
124
 
124
125
  @saml2_sso_url.setter
125
- def saml2_sso_url(self, value: pulumi.Input[str]):
126
+ def saml2_sso_url(self, value: pulumi.Input[builtins.str]):
126
127
  pulumi.set(self, "saml2_sso_url", value)
127
128
 
128
129
  @property
129
130
  @pulumi.getter(name="saml2X509Cert")
130
- def saml2_x509_cert(self) -> pulumi.Input[str]:
131
+ def saml2_x509_cert(self) -> pulumi.Input[builtins.str]:
131
132
  """
132
133
  The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
133
134
  """
134
135
  return pulumi.get(self, "saml2_x509_cert")
135
136
 
136
137
  @saml2_x509_cert.setter
137
- def saml2_x509_cert(self, value: pulumi.Input[str]):
138
+ def saml2_x509_cert(self, value: pulumi.Input[builtins.str]):
138
139
  pulumi.set(self, "saml2_x509_cert", value)
139
140
 
140
141
  @property
141
142
  @pulumi.getter(name="allowedEmailPatterns")
142
- def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
143
+ def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
143
144
  """
144
145
  A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
145
146
  """
146
147
  return pulumi.get(self, "allowed_email_patterns")
147
148
 
148
149
  @allowed_email_patterns.setter
149
- def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
150
+ def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
150
151
  pulumi.set(self, "allowed_email_patterns", value)
151
152
 
152
153
  @property
153
154
  @pulumi.getter(name="allowedUserDomains")
154
- def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
155
+ def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
155
156
  """
156
157
  A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
157
158
  """
158
159
  return pulumi.get(self, "allowed_user_domains")
159
160
 
160
161
  @allowed_user_domains.setter
161
- def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
162
+ def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
162
163
  pulumi.set(self, "allowed_user_domains", value)
163
164
 
164
165
  @property
165
166
  @pulumi.getter
166
- def comment(self) -> Optional[pulumi.Input[str]]:
167
+ def comment(self) -> Optional[pulumi.Input[builtins.str]]:
167
168
  """
168
169
  Specifies a comment for the integration.
169
170
  """
170
171
  return pulumi.get(self, "comment")
171
172
 
172
173
  @comment.setter
173
- def comment(self, value: Optional[pulumi.Input[str]]):
174
+ def comment(self, value: Optional[pulumi.Input[builtins.str]]):
174
175
  pulumi.set(self, "comment", value)
175
176
 
176
177
  @property
177
178
  @pulumi.getter
178
- def enabled(self) -> Optional[pulumi.Input[str]]:
179
+ def enabled(self) -> Optional[pulumi.Input[builtins.str]]:
179
180
  """
180
181
  Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
181
182
  """
182
183
  return pulumi.get(self, "enabled")
183
184
 
184
185
  @enabled.setter
185
- def enabled(self, value: Optional[pulumi.Input[str]]):
186
+ def enabled(self, value: Optional[pulumi.Input[builtins.str]]):
186
187
  pulumi.set(self, "enabled", value)
187
188
 
188
189
  @property
189
190
  @pulumi.getter
190
- def name(self) -> Optional[pulumi.Input[str]]:
191
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
191
192
  """
192
193
  Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
193
194
  """
194
195
  return pulumi.get(self, "name")
195
196
 
196
197
  @name.setter
197
- def name(self, value: Optional[pulumi.Input[str]]):
198
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
198
199
  pulumi.set(self, "name", value)
199
200
 
200
201
  @property
201
202
  @pulumi.getter(name="saml2EnableSpInitiated")
202
- def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[str]]:
203
+ def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[builtins.str]]:
203
204
  """
204
205
  The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
205
206
  """
206
207
  return pulumi.get(self, "saml2_enable_sp_initiated")
207
208
 
208
209
  @saml2_enable_sp_initiated.setter
209
- def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[str]]):
210
+ def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[builtins.str]]):
210
211
  pulumi.set(self, "saml2_enable_sp_initiated", value)
211
212
 
212
213
  @property
213
214
  @pulumi.getter(name="saml2ForceAuthn")
214
- def saml2_force_authn(self) -> Optional[pulumi.Input[str]]:
215
+ def saml2_force_authn(self) -> Optional[pulumi.Input[builtins.str]]:
215
216
  """
216
217
  The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
217
218
  """
218
219
  return pulumi.get(self, "saml2_force_authn")
219
220
 
220
221
  @saml2_force_authn.setter
221
- def saml2_force_authn(self, value: Optional[pulumi.Input[str]]):
222
+ def saml2_force_authn(self, value: Optional[pulumi.Input[builtins.str]]):
222
223
  pulumi.set(self, "saml2_force_authn", value)
223
224
 
224
225
  @property
225
226
  @pulumi.getter(name="saml2PostLogoutRedirectUrl")
226
- def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
227
+ def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[builtins.str]]:
227
228
  """
228
229
  The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
229
230
  """
230
231
  return pulumi.get(self, "saml2_post_logout_redirect_url")
231
232
 
232
233
  @saml2_post_logout_redirect_url.setter
233
- def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
234
+ def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[builtins.str]]):
234
235
  pulumi.set(self, "saml2_post_logout_redirect_url", value)
235
236
 
236
237
  @property
237
238
  @pulumi.getter(name="saml2RequestedNameidFormat")
238
- def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
239
+ def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[builtins.str]]:
239
240
  """
240
241
  The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
241
242
  """
242
243
  return pulumi.get(self, "saml2_requested_nameid_format")
243
244
 
244
245
  @saml2_requested_nameid_format.setter
245
- def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
246
+ def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[builtins.str]]):
246
247
  pulumi.set(self, "saml2_requested_nameid_format", value)
247
248
 
248
249
  @property
249
250
  @pulumi.getter(name="saml2SignRequest")
250
- def saml2_sign_request(self) -> Optional[pulumi.Input[str]]:
251
+ def saml2_sign_request(self) -> Optional[pulumi.Input[builtins.str]]:
251
252
  """
252
253
  The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
253
254
  """
254
255
  return pulumi.get(self, "saml2_sign_request")
255
256
 
256
257
  @saml2_sign_request.setter
257
- def saml2_sign_request(self, value: Optional[pulumi.Input[str]]):
258
+ def saml2_sign_request(self, value: Optional[pulumi.Input[builtins.str]]):
258
259
  pulumi.set(self, "saml2_sign_request", value)
259
260
 
260
261
  @property
261
262
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
262
- def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
263
+ def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[builtins.str]]:
263
264
  """
264
265
  The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
265
266
  """
266
267
  return pulumi.get(self, "saml2_snowflake_acs_url")
267
268
 
268
269
  @saml2_snowflake_acs_url.setter
269
- def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
270
+ def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[builtins.str]]):
270
271
  pulumi.set(self, "saml2_snowflake_acs_url", value)
271
272
 
272
273
  @property
273
274
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
274
- def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
275
+ def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[builtins.str]]:
275
276
  """
276
277
  The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
277
278
  """
278
279
  return pulumi.get(self, "saml2_snowflake_issuer_url")
279
280
 
280
281
  @saml2_snowflake_issuer_url.setter
281
- def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
282
+ def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[builtins.str]]):
282
283
  pulumi.set(self, "saml2_snowflake_issuer_url", value)
283
284
 
284
285
  @property
285
286
  @pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
286
- def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
287
+ def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[builtins.str]]:
287
288
  """
288
289
  The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
289
290
  """
290
291
  return pulumi.get(self, "saml2_sp_initiated_login_page_label")
291
292
 
292
293
  @saml2_sp_initiated_login_page_label.setter
293
- def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
294
+ def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[builtins.str]]):
294
295
  pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
295
296
 
296
297
 
297
298
  @pulumi.input_type
298
299
  class _Saml2IntegrationState:
299
300
  def __init__(__self__, *,
300
- allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
301
- allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
302
- comment: Optional[pulumi.Input[str]] = None,
301
+ allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
302
+ allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
303
+ comment: Optional[pulumi.Input[builtins.str]] = None,
303
304
  describe_outputs: Optional[pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationDescribeOutputArgs']]]] = None,
304
- enabled: Optional[pulumi.Input[str]] = None,
305
- fully_qualified_name: Optional[pulumi.Input[str]] = None,
306
- name: Optional[pulumi.Input[str]] = None,
307
- saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
308
- saml2_force_authn: Optional[pulumi.Input[str]] = None,
309
- saml2_issuer: Optional[pulumi.Input[str]] = None,
310
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
311
- saml2_provider: Optional[pulumi.Input[str]] = None,
312
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
313
- saml2_sign_request: Optional[pulumi.Input[str]] = None,
314
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
315
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
316
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
317
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
318
- saml2_x509_cert: Optional[pulumi.Input[str]] = None,
305
+ enabled: Optional[pulumi.Input[builtins.str]] = None,
306
+ fully_qualified_name: Optional[pulumi.Input[builtins.str]] = None,
307
+ name: Optional[pulumi.Input[builtins.str]] = None,
308
+ saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
309
+ saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
310
+ saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
311
+ saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
312
+ saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
313
+ saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
314
+ saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
315
+ saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
316
+ saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
317
+ saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
318
+ saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
319
+ saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
319
320
  show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationShowOutputArgs']]]] = None):
320
321
  """
321
322
  Input properties used for looking up and filtering Saml2Integration resources.
322
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
323
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
324
- :param pulumi.Input[str] comment: Specifies a comment for the integration.
323
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
324
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
325
+ :param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
325
326
  :param pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationDescribeOutputArgs']]] describe_outputs: Outputs the result of `DESCRIBE SECURITY INTEGRATION` for the given integration.
326
- :param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
327
- :param pulumi.Input[str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
328
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
329
- :param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
330
- :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
331
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
332
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
333
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
334
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
335
- :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
336
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
337
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
338
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
339
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
340
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
327
+ :param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
328
+ :param pulumi.Input[builtins.str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
329
+ :param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
330
+ :param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
331
+ :param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
332
+ :param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
333
+ :param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
334
+ :param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
335
+ :param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
336
+ :param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
337
+ :param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
338
+ :param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
339
+ :param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
340
+ :param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
341
+ :param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
341
342
  :param pulumi.Input[Sequence[pulumi.Input['Saml2IntegrationShowOutputArgs']]] show_outputs: Outputs the result of `SHOW SECURITY INTEGRATION` for the given integration.
342
343
  """
343
344
  if allowed_email_patterns is not None:
@@ -383,38 +384,38 @@ class _Saml2IntegrationState:
383
384
 
384
385
  @property
385
386
  @pulumi.getter(name="allowedEmailPatterns")
386
- def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
387
+ def allowed_email_patterns(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
387
388
  """
388
389
  A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
389
390
  """
390
391
  return pulumi.get(self, "allowed_email_patterns")
391
392
 
392
393
  @allowed_email_patterns.setter
393
- def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
394
+ def allowed_email_patterns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
394
395
  pulumi.set(self, "allowed_email_patterns", value)
395
396
 
396
397
  @property
397
398
  @pulumi.getter(name="allowedUserDomains")
398
- def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
399
+ def allowed_user_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
399
400
  """
400
401
  A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
401
402
  """
402
403
  return pulumi.get(self, "allowed_user_domains")
403
404
 
404
405
  @allowed_user_domains.setter
405
- def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
406
+ def allowed_user_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
406
407
  pulumi.set(self, "allowed_user_domains", value)
407
408
 
408
409
  @property
409
410
  @pulumi.getter
410
- def comment(self) -> Optional[pulumi.Input[str]]:
411
+ def comment(self) -> Optional[pulumi.Input[builtins.str]]:
411
412
  """
412
413
  Specifies a comment for the integration.
413
414
  """
414
415
  return pulumi.get(self, "comment")
415
416
 
416
417
  @comment.setter
417
- def comment(self, value: Optional[pulumi.Input[str]]):
418
+ def comment(self, value: Optional[pulumi.Input[builtins.str]]):
418
419
  pulumi.set(self, "comment", value)
419
420
 
420
421
  @property
@@ -431,182 +432,182 @@ class _Saml2IntegrationState:
431
432
 
432
433
  @property
433
434
  @pulumi.getter
434
- def enabled(self) -> Optional[pulumi.Input[str]]:
435
+ def enabled(self) -> Optional[pulumi.Input[builtins.str]]:
435
436
  """
436
437
  Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
437
438
  """
438
439
  return pulumi.get(self, "enabled")
439
440
 
440
441
  @enabled.setter
441
- def enabled(self, value: Optional[pulumi.Input[str]]):
442
+ def enabled(self, value: Optional[pulumi.Input[builtins.str]]):
442
443
  pulumi.set(self, "enabled", value)
443
444
 
444
445
  @property
445
446
  @pulumi.getter(name="fullyQualifiedName")
446
- def fully_qualified_name(self) -> Optional[pulumi.Input[str]]:
447
+ def fully_qualified_name(self) -> Optional[pulumi.Input[builtins.str]]:
447
448
  """
448
449
  Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
449
450
  """
450
451
  return pulumi.get(self, "fully_qualified_name")
451
452
 
452
453
  @fully_qualified_name.setter
453
- def fully_qualified_name(self, value: Optional[pulumi.Input[str]]):
454
+ def fully_qualified_name(self, value: Optional[pulumi.Input[builtins.str]]):
454
455
  pulumi.set(self, "fully_qualified_name", value)
455
456
 
456
457
  @property
457
458
  @pulumi.getter
458
- def name(self) -> Optional[pulumi.Input[str]]:
459
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
459
460
  """
460
461
  Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
461
462
  """
462
463
  return pulumi.get(self, "name")
463
464
 
464
465
  @name.setter
465
- def name(self, value: Optional[pulumi.Input[str]]):
466
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
466
467
  pulumi.set(self, "name", value)
467
468
 
468
469
  @property
469
470
  @pulumi.getter(name="saml2EnableSpInitiated")
470
- def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[str]]:
471
+ def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[builtins.str]]:
471
472
  """
472
473
  The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
473
474
  """
474
475
  return pulumi.get(self, "saml2_enable_sp_initiated")
475
476
 
476
477
  @saml2_enable_sp_initiated.setter
477
- def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[str]]):
478
+ def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[builtins.str]]):
478
479
  pulumi.set(self, "saml2_enable_sp_initiated", value)
479
480
 
480
481
  @property
481
482
  @pulumi.getter(name="saml2ForceAuthn")
482
- def saml2_force_authn(self) -> Optional[pulumi.Input[str]]:
483
+ def saml2_force_authn(self) -> Optional[pulumi.Input[builtins.str]]:
483
484
  """
484
485
  The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
485
486
  """
486
487
  return pulumi.get(self, "saml2_force_authn")
487
488
 
488
489
  @saml2_force_authn.setter
489
- def saml2_force_authn(self, value: Optional[pulumi.Input[str]]):
490
+ def saml2_force_authn(self, value: Optional[pulumi.Input[builtins.str]]):
490
491
  pulumi.set(self, "saml2_force_authn", value)
491
492
 
492
493
  @property
493
494
  @pulumi.getter(name="saml2Issuer")
494
- def saml2_issuer(self) -> Optional[pulumi.Input[str]]:
495
+ def saml2_issuer(self) -> Optional[pulumi.Input[builtins.str]]:
495
496
  """
496
497
  The string containing the IdP EntityID / Issuer.
497
498
  """
498
499
  return pulumi.get(self, "saml2_issuer")
499
500
 
500
501
  @saml2_issuer.setter
501
- def saml2_issuer(self, value: Optional[pulumi.Input[str]]):
502
+ def saml2_issuer(self, value: Optional[pulumi.Input[builtins.str]]):
502
503
  pulumi.set(self, "saml2_issuer", value)
503
504
 
504
505
  @property
505
506
  @pulumi.getter(name="saml2PostLogoutRedirectUrl")
506
- def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
507
+ def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[builtins.str]]:
507
508
  """
508
509
  The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
509
510
  """
510
511
  return pulumi.get(self, "saml2_post_logout_redirect_url")
511
512
 
512
513
  @saml2_post_logout_redirect_url.setter
513
- def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
514
+ def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[builtins.str]]):
514
515
  pulumi.set(self, "saml2_post_logout_redirect_url", value)
515
516
 
516
517
  @property
517
518
  @pulumi.getter(name="saml2Provider")
518
- def saml2_provider(self) -> Optional[pulumi.Input[str]]:
519
+ def saml2_provider(self) -> Optional[pulumi.Input[builtins.str]]:
519
520
  """
520
521
  The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
521
522
  """
522
523
  return pulumi.get(self, "saml2_provider")
523
524
 
524
525
  @saml2_provider.setter
525
- def saml2_provider(self, value: Optional[pulumi.Input[str]]):
526
+ def saml2_provider(self, value: Optional[pulumi.Input[builtins.str]]):
526
527
  pulumi.set(self, "saml2_provider", value)
527
528
 
528
529
  @property
529
530
  @pulumi.getter(name="saml2RequestedNameidFormat")
530
- def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
531
+ def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[builtins.str]]:
531
532
  """
532
533
  The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
533
534
  """
534
535
  return pulumi.get(self, "saml2_requested_nameid_format")
535
536
 
536
537
  @saml2_requested_nameid_format.setter
537
- def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
538
+ def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[builtins.str]]):
538
539
  pulumi.set(self, "saml2_requested_nameid_format", value)
539
540
 
540
541
  @property
541
542
  @pulumi.getter(name="saml2SignRequest")
542
- def saml2_sign_request(self) -> Optional[pulumi.Input[str]]:
543
+ def saml2_sign_request(self) -> Optional[pulumi.Input[builtins.str]]:
543
544
  """
544
545
  The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
545
546
  """
546
547
  return pulumi.get(self, "saml2_sign_request")
547
548
 
548
549
  @saml2_sign_request.setter
549
- def saml2_sign_request(self, value: Optional[pulumi.Input[str]]):
550
+ def saml2_sign_request(self, value: Optional[pulumi.Input[builtins.str]]):
550
551
  pulumi.set(self, "saml2_sign_request", value)
551
552
 
552
553
  @property
553
554
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
554
- def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
555
+ def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[builtins.str]]:
555
556
  """
556
557
  The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
557
558
  """
558
559
  return pulumi.get(self, "saml2_snowflake_acs_url")
559
560
 
560
561
  @saml2_snowflake_acs_url.setter
561
- def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
562
+ def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[builtins.str]]):
562
563
  pulumi.set(self, "saml2_snowflake_acs_url", value)
563
564
 
564
565
  @property
565
566
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
566
- def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
567
+ def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[builtins.str]]:
567
568
  """
568
569
  The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
569
570
  """
570
571
  return pulumi.get(self, "saml2_snowflake_issuer_url")
571
572
 
572
573
  @saml2_snowflake_issuer_url.setter
573
- def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
574
+ def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[builtins.str]]):
574
575
  pulumi.set(self, "saml2_snowflake_issuer_url", value)
575
576
 
576
577
  @property
577
578
  @pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
578
- def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
579
+ def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[builtins.str]]:
579
580
  """
580
581
  The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
581
582
  """
582
583
  return pulumi.get(self, "saml2_sp_initiated_login_page_label")
583
584
 
584
585
  @saml2_sp_initiated_login_page_label.setter
585
- def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
586
+ def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[builtins.str]]):
586
587
  pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
587
588
 
588
589
  @property
589
590
  @pulumi.getter(name="saml2SsoUrl")
590
- def saml2_sso_url(self) -> Optional[pulumi.Input[str]]:
591
+ def saml2_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
591
592
  """
592
593
  The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
593
594
  """
594
595
  return pulumi.get(self, "saml2_sso_url")
595
596
 
596
597
  @saml2_sso_url.setter
597
- def saml2_sso_url(self, value: Optional[pulumi.Input[str]]):
598
+ def saml2_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
598
599
  pulumi.set(self, "saml2_sso_url", value)
599
600
 
600
601
  @property
601
602
  @pulumi.getter(name="saml2X509Cert")
602
- def saml2_x509_cert(self) -> Optional[pulumi.Input[str]]:
603
+ def saml2_x509_cert(self) -> Optional[pulumi.Input[builtins.str]]:
603
604
  """
604
605
  The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
605
606
  """
606
607
  return pulumi.get(self, "saml2_x509_cert")
607
608
 
608
609
  @saml2_x509_cert.setter
609
- def saml2_x509_cert(self, value: Optional[pulumi.Input[str]]):
610
+ def saml2_x509_cert(self, value: Optional[pulumi.Input[builtins.str]]):
610
611
  pulumi.set(self, "saml2_x509_cert", value)
611
612
 
612
613
  @property
@@ -627,23 +628,23 @@ class Saml2Integration(pulumi.CustomResource):
627
628
  def __init__(__self__,
628
629
  resource_name: str,
629
630
  opts: Optional[pulumi.ResourceOptions] = None,
630
- allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
631
- allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
632
- comment: Optional[pulumi.Input[str]] = None,
633
- enabled: Optional[pulumi.Input[str]] = None,
634
- name: Optional[pulumi.Input[str]] = None,
635
- saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
636
- saml2_force_authn: Optional[pulumi.Input[str]] = None,
637
- saml2_issuer: Optional[pulumi.Input[str]] = None,
638
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
639
- saml2_provider: Optional[pulumi.Input[str]] = None,
640
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
641
- saml2_sign_request: Optional[pulumi.Input[str]] = None,
642
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
643
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
644
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
645
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
646
- saml2_x509_cert: Optional[pulumi.Input[str]] = None,
631
+ allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
632
+ allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
633
+ comment: Optional[pulumi.Input[builtins.str]] = None,
634
+ enabled: Optional[pulumi.Input[builtins.str]] = None,
635
+ name: Optional[pulumi.Input[builtins.str]] = None,
636
+ saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
637
+ saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
638
+ saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
639
+ saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
640
+ saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
641
+ saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
642
+ saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
643
+ saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
644
+ saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
645
+ saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
646
+ saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
647
+ saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
647
648
  __props__=None):
648
649
  """
649
650
  ## Import
@@ -654,23 +655,23 @@ class Saml2Integration(pulumi.CustomResource):
654
655
 
655
656
  :param str resource_name: The name of the resource.
656
657
  :param pulumi.ResourceOptions opts: Options for the resource.
657
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
658
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
659
- :param pulumi.Input[str] comment: Specifies a comment for the integration.
660
- :param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
661
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
662
- :param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
663
- :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
664
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
665
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
666
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
667
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
668
- :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
669
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
670
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
671
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
672
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
673
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
658
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
659
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
660
+ :param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
661
+ :param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
662
+ :param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
663
+ :param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
664
+ :param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
665
+ :param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
666
+ :param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
667
+ :param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
668
+ :param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
669
+ :param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
670
+ :param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
671
+ :param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
672
+ :param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
673
+ :param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
674
+ :param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
674
675
  """
675
676
  ...
676
677
  @overload
@@ -700,23 +701,23 @@ class Saml2Integration(pulumi.CustomResource):
700
701
  def _internal_init(__self__,
701
702
  resource_name: str,
702
703
  opts: Optional[pulumi.ResourceOptions] = None,
703
- allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
704
- allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
705
- comment: Optional[pulumi.Input[str]] = None,
706
- enabled: Optional[pulumi.Input[str]] = None,
707
- name: Optional[pulumi.Input[str]] = None,
708
- saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
709
- saml2_force_authn: Optional[pulumi.Input[str]] = None,
710
- saml2_issuer: Optional[pulumi.Input[str]] = None,
711
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
712
- saml2_provider: Optional[pulumi.Input[str]] = None,
713
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
714
- saml2_sign_request: Optional[pulumi.Input[str]] = None,
715
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
716
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
717
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
718
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
719
- saml2_x509_cert: Optional[pulumi.Input[str]] = None,
704
+ allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
705
+ allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
706
+ comment: Optional[pulumi.Input[builtins.str]] = None,
707
+ enabled: Optional[pulumi.Input[builtins.str]] = None,
708
+ name: Optional[pulumi.Input[builtins.str]] = None,
709
+ saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
710
+ saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
711
+ saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
712
+ saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
713
+ saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
714
+ saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
715
+ saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
716
+ saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
717
+ saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
718
+ saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
719
+ saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
720
+ saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
720
721
  __props__=None):
721
722
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
722
723
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -764,25 +765,25 @@ class Saml2Integration(pulumi.CustomResource):
764
765
  def get(resource_name: str,
765
766
  id: pulumi.Input[str],
766
767
  opts: Optional[pulumi.ResourceOptions] = None,
767
- allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
768
- allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
769
- comment: Optional[pulumi.Input[str]] = None,
768
+ allowed_email_patterns: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
769
+ allowed_user_domains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
770
+ comment: Optional[pulumi.Input[builtins.str]] = None,
770
771
  describe_outputs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationDescribeOutputArgs', 'Saml2IntegrationDescribeOutputArgsDict']]]]] = None,
771
- enabled: Optional[pulumi.Input[str]] = None,
772
- fully_qualified_name: Optional[pulumi.Input[str]] = None,
773
- name: Optional[pulumi.Input[str]] = None,
774
- saml2_enable_sp_initiated: Optional[pulumi.Input[str]] = None,
775
- saml2_force_authn: Optional[pulumi.Input[str]] = None,
776
- saml2_issuer: Optional[pulumi.Input[str]] = None,
777
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
778
- saml2_provider: Optional[pulumi.Input[str]] = None,
779
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
780
- saml2_sign_request: Optional[pulumi.Input[str]] = None,
781
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
782
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
783
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
784
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
785
- saml2_x509_cert: Optional[pulumi.Input[str]] = None,
772
+ enabled: Optional[pulumi.Input[builtins.str]] = None,
773
+ fully_qualified_name: Optional[pulumi.Input[builtins.str]] = None,
774
+ name: Optional[pulumi.Input[builtins.str]] = None,
775
+ saml2_enable_sp_initiated: Optional[pulumi.Input[builtins.str]] = None,
776
+ saml2_force_authn: Optional[pulumi.Input[builtins.str]] = None,
777
+ saml2_issuer: Optional[pulumi.Input[builtins.str]] = None,
778
+ saml2_post_logout_redirect_url: Optional[pulumi.Input[builtins.str]] = None,
779
+ saml2_provider: Optional[pulumi.Input[builtins.str]] = None,
780
+ saml2_requested_nameid_format: Optional[pulumi.Input[builtins.str]] = None,
781
+ saml2_sign_request: Optional[pulumi.Input[builtins.str]] = None,
782
+ saml2_snowflake_acs_url: Optional[pulumi.Input[builtins.str]] = None,
783
+ saml2_snowflake_issuer_url: Optional[pulumi.Input[builtins.str]] = None,
784
+ saml2_sp_initiated_login_page_label: Optional[pulumi.Input[builtins.str]] = None,
785
+ saml2_sso_url: Optional[pulumi.Input[builtins.str]] = None,
786
+ saml2_x509_cert: Optional[pulumi.Input[builtins.str]] = None,
786
787
  show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationShowOutputArgs', 'Saml2IntegrationShowOutputArgsDict']]]]] = None) -> 'Saml2Integration':
787
788
  """
788
789
  Get an existing Saml2Integration resource's state with the given name, id, and optional extra
@@ -791,25 +792,25 @@ class Saml2Integration(pulumi.CustomResource):
791
792
  :param str resource_name: The unique name of the resulting resource.
792
793
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
793
794
  :param pulumi.ResourceOptions opts: Options for the resource.
794
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
795
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
796
- :param pulumi.Input[str] comment: Specifies a comment for the integration.
795
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
796
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_user_domains: A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
797
+ :param pulumi.Input[builtins.str] comment: Specifies a comment for the integration.
797
798
  :param pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationDescribeOutputArgs', 'Saml2IntegrationDescribeOutputArgsDict']]]] describe_outputs: Outputs the result of `DESCRIBE SECURITY INTEGRATION` for the given integration.
798
- :param pulumi.Input[str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
799
- :param pulumi.Input[str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
800
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
801
- :param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
802
- :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
803
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
804
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
805
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
806
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
807
- :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
808
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
809
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
810
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
811
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
812
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
799
+ :param pulumi.Input[builtins.str] enabled: Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
800
+ :param pulumi.Input[builtins.str] fully_qualified_name: Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
801
+ :param pulumi.Input[builtins.str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
802
+ :param pulumi.Input[builtins.str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
803
+ :param pulumi.Input[builtins.str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
804
+ :param pulumi.Input[builtins.str] saml2_issuer: The string containing the IdP EntityID / Issuer.
805
+ :param pulumi.Input[builtins.str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
806
+ :param pulumi.Input[builtins.str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
807
+ :param pulumi.Input[builtins.str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
808
+ :param pulumi.Input[builtins.str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
809
+ :param pulumi.Input[builtins.str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
810
+ :param pulumi.Input[builtins.str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
811
+ :param pulumi.Input[builtins.str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
812
+ :param pulumi.Input[builtins.str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
813
+ :param pulumi.Input[builtins.str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
813
814
  :param pulumi.Input[Sequence[pulumi.Input[Union['Saml2IntegrationShowOutputArgs', 'Saml2IntegrationShowOutputArgsDict']]]] show_outputs: Outputs the result of `SHOW SECURITY INTEGRATION` for the given integration.
814
815
  """
815
816
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -840,7 +841,7 @@ class Saml2Integration(pulumi.CustomResource):
840
841
 
841
842
  @property
842
843
  @pulumi.getter(name="allowedEmailPatterns")
843
- def allowed_email_patterns(self) -> pulumi.Output[Optional[Sequence[str]]]:
844
+ def allowed_email_patterns(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
844
845
  """
845
846
  A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
846
847
  """
@@ -848,7 +849,7 @@ class Saml2Integration(pulumi.CustomResource):
848
849
 
849
850
  @property
850
851
  @pulumi.getter(name="allowedUserDomains")
851
- def allowed_user_domains(self) -> pulumi.Output[Optional[Sequence[str]]]:
852
+ def allowed_user_domains(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
852
853
  """
853
854
  A list of email domains that can authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
854
855
  """
@@ -856,7 +857,7 @@ class Saml2Integration(pulumi.CustomResource):
856
857
 
857
858
  @property
858
859
  @pulumi.getter
859
- def comment(self) -> pulumi.Output[Optional[str]]:
860
+ def comment(self) -> pulumi.Output[Optional[builtins.str]]:
860
861
  """
861
862
  Specifies a comment for the integration.
862
863
  """
@@ -872,7 +873,7 @@ class Saml2Integration(pulumi.CustomResource):
872
873
 
873
874
  @property
874
875
  @pulumi.getter
875
- def enabled(self) -> pulumi.Output[Optional[str]]:
876
+ def enabled(self) -> pulumi.Output[Optional[builtins.str]]:
876
877
  """
877
878
  Specifies whether this security integration is enabled or disabled. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
878
879
  """
@@ -880,7 +881,7 @@ class Saml2Integration(pulumi.CustomResource):
880
881
 
881
882
  @property
882
883
  @pulumi.getter(name="fullyQualifiedName")
883
- def fully_qualified_name(self) -> pulumi.Output[str]:
884
+ def fully_qualified_name(self) -> pulumi.Output[builtins.str]:
884
885
  """
885
886
  Fully qualified name of the resource. For more information, see [object name resolution](https://docs.snowflake.com/en/sql-reference/name-resolution).
886
887
  """
@@ -888,7 +889,7 @@ class Saml2Integration(pulumi.CustomResource):
888
889
 
889
890
  @property
890
891
  @pulumi.getter
891
- def name(self) -> pulumi.Output[str]:
892
+ def name(self) -> pulumi.Output[builtins.str]:
892
893
  """
893
894
  Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account. Due to technical limitations (read more here), avoid using the following characters: `|`, `.`, `"`.
894
895
  """
@@ -896,7 +897,7 @@ class Saml2Integration(pulumi.CustomResource):
896
897
 
897
898
  @property
898
899
  @pulumi.getter(name="saml2EnableSpInitiated")
899
- def saml2_enable_sp_initiated(self) -> pulumi.Output[Optional[str]]:
900
+ def saml2_enable_sp_initiated(self) -> pulumi.Output[Optional[builtins.str]]:
900
901
  """
901
902
  The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
902
903
  """
@@ -904,7 +905,7 @@ class Saml2Integration(pulumi.CustomResource):
904
905
 
905
906
  @property
906
907
  @pulumi.getter(name="saml2ForceAuthn")
907
- def saml2_force_authn(self) -> pulumi.Output[Optional[str]]:
908
+ def saml2_force_authn(self) -> pulumi.Output[Optional[builtins.str]]:
908
909
  """
909
910
  The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
910
911
  """
@@ -912,7 +913,7 @@ class Saml2Integration(pulumi.CustomResource):
912
913
 
913
914
  @property
914
915
  @pulumi.getter(name="saml2Issuer")
915
- def saml2_issuer(self) -> pulumi.Output[str]:
916
+ def saml2_issuer(self) -> pulumi.Output[builtins.str]:
916
917
  """
917
918
  The string containing the IdP EntityID / Issuer.
918
919
  """
@@ -920,7 +921,7 @@ class Saml2Integration(pulumi.CustomResource):
920
921
 
921
922
  @property
922
923
  @pulumi.getter(name="saml2PostLogoutRedirectUrl")
923
- def saml2_post_logout_redirect_url(self) -> pulumi.Output[Optional[str]]:
924
+ def saml2_post_logout_redirect_url(self) -> pulumi.Output[Optional[builtins.str]]:
924
925
  """
925
926
  The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
926
927
  """
@@ -928,7 +929,7 @@ class Saml2Integration(pulumi.CustomResource):
928
929
 
929
930
  @property
930
931
  @pulumi.getter(name="saml2Provider")
931
- def saml2_provider(self) -> pulumi.Output[str]:
932
+ def saml2_provider(self) -> pulumi.Output[builtins.str]:
932
933
  """
933
934
  The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
934
935
  """
@@ -936,7 +937,7 @@ class Saml2Integration(pulumi.CustomResource):
936
937
 
937
938
  @property
938
939
  @pulumi.getter(name="saml2RequestedNameidFormat")
939
- def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[str]]:
940
+ def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[builtins.str]]:
940
941
  """
941
942
  The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
942
943
  """
@@ -944,7 +945,7 @@ class Saml2Integration(pulumi.CustomResource):
944
945
 
945
946
  @property
946
947
  @pulumi.getter(name="saml2SignRequest")
947
- def saml2_sign_request(self) -> pulumi.Output[Optional[str]]:
948
+ def saml2_sign_request(self) -> pulumi.Output[Optional[builtins.str]]:
948
949
  """
949
950
  The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
950
951
  """
@@ -952,7 +953,7 @@ class Saml2Integration(pulumi.CustomResource):
952
953
 
953
954
  @property
954
955
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
955
- def saml2_snowflake_acs_url(self) -> pulumi.Output[Optional[str]]:
956
+ def saml2_snowflake_acs_url(self) -> pulumi.Output[Optional[builtins.str]]:
956
957
  """
957
958
  The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
958
959
  """
@@ -960,7 +961,7 @@ class Saml2Integration(pulumi.CustomResource):
960
961
 
961
962
  @property
962
963
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
963
- def saml2_snowflake_issuer_url(self) -> pulumi.Output[Optional[str]]:
964
+ def saml2_snowflake_issuer_url(self) -> pulumi.Output[Optional[builtins.str]]:
964
965
  """
965
966
  The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
966
967
  """
@@ -968,7 +969,7 @@ class Saml2Integration(pulumi.CustomResource):
968
969
 
969
970
  @property
970
971
  @pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
971
- def saml2_sp_initiated_login_page_label(self) -> pulumi.Output[Optional[str]]:
972
+ def saml2_sp_initiated_login_page_label(self) -> pulumi.Output[Optional[builtins.str]]:
972
973
  """
973
974
  The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
974
975
  """
@@ -976,7 +977,7 @@ class Saml2Integration(pulumi.CustomResource):
976
977
 
977
978
  @property
978
979
  @pulumi.getter(name="saml2SsoUrl")
979
- def saml2_sso_url(self) -> pulumi.Output[str]:
980
+ def saml2_sso_url(self) -> pulumi.Output[builtins.str]:
980
981
  """
981
982
  The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
982
983
  """
@@ -984,7 +985,7 @@ class Saml2Integration(pulumi.CustomResource):
984
985
 
985
986
  @property
986
987
  @pulumi.getter(name="saml2X509Cert")
987
- def saml2_x509_cert(self) -> pulumi.Output[str]:
988
+ def saml2_x509_cert(self) -> pulumi.Output[builtins.str]:
988
989
  """
989
990
  The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
990
991
  """