pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -134,7 +134,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
- <!--Start PulumiCodeChooser -->
138
137
  ```python
139
138
  import pulumi
140
139
  import json
@@ -157,7 +156,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
157
156
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
158
157
  name=aws_secret.name)
159
158
  ```
160
- <!--End PulumiCodeChooser -->
161
159
 
162
160
  ## Required Vault Capabilities
163
161
 
@@ -211,7 +209,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
211
209
  """
212
210
  ## Example Usage
213
211
 
214
- <!--Start PulumiCodeChooser -->
215
212
  ```python
216
213
  import pulumi
217
214
  import json
@@ -234,7 +231,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
234
231
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
235
232
  name=aws_secret.name)
236
233
  ```
237
- <!--End PulumiCodeChooser -->
238
234
 
239
235
  ## Required Vault Capabilities
240
236
 
@@ -179,7 +179,6 @@ def get_secret_v2(mount: Optional[str] = None,
179
179
  """
180
180
  ## Example Usage
181
181
 
182
- <!--Start PulumiCodeChooser -->
183
182
  ```python
184
183
  import pulumi
185
184
  import json
@@ -204,7 +203,6 @@ def get_secret_v2(mount: Optional[str] = None,
204
203
  example = vault.kv.get_secret_v2_output(mount=kvv2.path,
205
204
  name=example_secret_v2.name)
206
205
  ```
207
- <!--End PulumiCodeChooser -->
208
206
 
209
207
  ## Required Vault Capabilities
210
208
 
@@ -254,7 +252,6 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
254
252
  """
255
253
  ## Example Usage
256
254
 
257
- <!--Start PulumiCodeChooser -->
258
255
  ```python
259
256
  import pulumi
260
257
  import json
@@ -279,7 +276,6 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
279
276
  example = vault.kv.get_secret_v2_output(mount=kvv2.path,
280
277
  name=example_secret_v2.name)
281
278
  ```
282
- <!--End PulumiCodeChooser -->
283
279
 
284
280
  ## Required Vault Capabilities
285
281
 
@@ -80,7 +80,6 @@ def get_secrets_list(namespace: Optional[str] = None,
80
80
  """
81
81
  ## Example Usage
82
82
 
83
- <!--Start PulumiCodeChooser -->
84
83
  ```python
85
84
  import pulumi
86
85
  import json
@@ -105,7 +104,6 @@ def get_secrets_list(namespace: Optional[str] = None,
105
104
  }))
106
105
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
107
106
  ```
108
- <!--End PulumiCodeChooser -->
109
107
 
110
108
  ## Required Vault Capabilities
111
109
 
@@ -138,7 +136,6 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
138
136
  """
139
137
  ## Example Usage
140
138
 
141
- <!--Start PulumiCodeChooser -->
142
139
  ```python
143
140
  import pulumi
144
141
  import json
@@ -163,7 +160,6 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
163
160
  }))
164
161
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
165
162
  ```
166
- <!--End PulumiCodeChooser -->
167
163
 
168
164
  ## Required Vault Capabilities
169
165
 
@@ -102,7 +102,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
102
102
  """
103
103
  ## Example Usage
104
104
 
105
- <!--Start PulumiCodeChooser -->
106
105
  ```python
107
106
  import pulumi
108
107
  import json
@@ -137,7 +136,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
137
136
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
138
137
  name=test2["name"]))
139
138
  ```
140
- <!--End PulumiCodeChooser -->
141
139
 
142
140
  ## Required Vault Capabilities
143
141
 
@@ -178,7 +176,6 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
178
176
  """
179
177
  ## Example Usage
180
178
 
181
- <!--Start PulumiCodeChooser -->
182
179
  ```python
183
180
  import pulumi
184
181
  import json
@@ -213,7 +210,6 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
213
210
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
214
211
  name=test2["name"]))
215
212
  ```
216
- <!--End PulumiCodeChooser -->
217
213
 
218
214
  ## Required Vault Capabilities
219
215
 
pulumi_vault/kv/secret.py CHANGED
@@ -176,7 +176,6 @@ class Secret(pulumi.CustomResource):
176
176
 
177
177
  ## Example Usage
178
178
 
179
- <!--Start PulumiCodeChooser -->
180
179
  ```python
181
180
  import pulumi
182
181
  import json
@@ -196,7 +195,6 @@ class Secret(pulumi.CustomResource):
196
195
  "foo": "bar",
197
196
  }))
198
197
  ```
199
- <!--End PulumiCodeChooser -->
200
198
 
201
199
  ## Required Vault Capabilities
202
200
 
@@ -237,7 +235,6 @@ class Secret(pulumi.CustomResource):
237
235
 
238
236
  ## Example Usage
239
237
 
240
- <!--Start PulumiCodeChooser -->
241
238
  ```python
242
239
  import pulumi
243
240
  import json
@@ -257,7 +254,6 @@ class Secret(pulumi.CustomResource):
257
254
  "foo": "bar",
258
255
  }))
259
256
  ```
260
- <!--End PulumiCodeChooser -->
261
257
 
262
258
  ## Required Vault Capabilities
263
259
 
@@ -226,7 +226,6 @@ class SecretBackendV2(pulumi.CustomResource):
226
226
 
227
227
  ## Example Usage
228
228
 
229
- <!--Start PulumiCodeChooser -->
230
229
  ```python
231
230
  import pulumi
232
231
  import pulumi_vault as vault
@@ -244,7 +243,6 @@ class SecretBackendV2(pulumi.CustomResource):
244
243
  delete_version_after=12600,
245
244
  cas_required=True)
246
245
  ```
247
- <!--End PulumiCodeChooser -->
248
246
 
249
247
  ## Required Vault Capabilities
250
248
 
@@ -290,7 +288,6 @@ class SecretBackendV2(pulumi.CustomResource):
290
288
 
291
289
  ## Example Usage
292
290
 
293
- <!--Start PulumiCodeChooser -->
294
291
  ```python
295
292
  import pulumi
296
293
  import pulumi_vault as vault
@@ -308,7 +305,6 @@ class SecretBackendV2(pulumi.CustomResource):
308
305
  delete_version_after=12600,
309
306
  cas_required=True)
310
307
  ```
311
- <!--End PulumiCodeChooser -->
312
308
 
313
309
  ## Required Vault Capabilities
314
310
 
@@ -448,7 +448,6 @@ class SecretV2(pulumi.CustomResource):
448
448
 
449
449
  ## Example Usage
450
450
 
451
- <!--Start PulumiCodeChooser -->
452
451
  ```python
453
452
  import pulumi
454
453
  import json
@@ -478,7 +477,6 @@ class SecretV2(pulumi.CustomResource):
478
477
  },
479
478
  ))
480
479
  ```
481
- <!--End PulumiCodeChooser -->
482
480
 
483
481
  ## Required Vault Capabilities
484
482
 
@@ -547,7 +545,6 @@ class SecretV2(pulumi.CustomResource):
547
545
 
548
546
  ## Example Usage
549
547
 
550
- <!--Start PulumiCodeChooser -->
551
548
  ```python
552
549
  import pulumi
553
550
  import json
@@ -577,7 +574,6 @@ class SecretV2(pulumi.CustomResource):
577
574
  },
578
575
  ))
579
576
  ```
580
- <!--End PulumiCodeChooser -->
581
577
 
582
578
  ## Required Vault Capabilities
583
579
 
@@ -78,27 +78,14 @@ class AuthBackendArgs:
78
78
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
79
79
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
80
80
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
81
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
82
- addresses which can authenticate successfully, and ties the resulting token to these blocks
83
- as well.
84
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
85
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
86
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
87
- `token_max_ttl` would otherwise allow a renewal.
88
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
89
- Its current value will be referenced at renewal time.
90
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
91
- generated tokens; otherwise it will be added to the policies set in token_policies.
92
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
93
- of times a generated token may be used (within its lifetime); 0 means unlimited.
94
- :param pulumi.Input[int] token_period: If set, indicates that the
95
- token generated using this role should never expire. The token should be renewed within the
96
- duration specified by this value. At each renewal, the token's TTL will be set to the
97
- value of this field. Specified in seconds.
98
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
99
- on the auth method, this list may be supplemented by user/group/other values.
100
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
101
- Its current value will be referenced at renewal time.
81
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
82
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
83
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
84
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
85
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
86
+ :param pulumi.Input[int] token_period: Generated Token's Period
87
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
88
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
102
89
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
103
90
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
104
91
  :param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
@@ -448,9 +435,7 @@ class AuthBackendArgs:
448
435
  @pulumi.getter(name="tokenBoundCidrs")
449
436
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
450
437
  """
451
- List of CIDR blocks; if set, specifies blocks of IP
452
- addresses which can authenticate successfully, and ties the resulting token to these blocks
453
- as well.
438
+ Specifies the blocks of IP addresses which are allowed to use the generated token
454
439
  """
455
440
  return pulumi.get(self, "token_bound_cidrs")
456
441
 
@@ -462,10 +447,7 @@ class AuthBackendArgs:
462
447
  @pulumi.getter(name="tokenExplicitMaxTtl")
463
448
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
464
449
  """
465
- If set, will encode an
466
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
467
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
468
- `token_max_ttl` would otherwise allow a renewal.
450
+ Generated Token's Explicit Maximum TTL in seconds
469
451
  """
470
452
  return pulumi.get(self, "token_explicit_max_ttl")
471
453
 
@@ -477,8 +459,7 @@ class AuthBackendArgs:
477
459
  @pulumi.getter(name="tokenMaxTtl")
478
460
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
479
461
  """
480
- The maximum lifetime for generated tokens in number of seconds.
481
- Its current value will be referenced at renewal time.
462
+ The maximum lifetime of the generated token
482
463
  """
483
464
  return pulumi.get(self, "token_max_ttl")
484
465
 
@@ -490,8 +471,7 @@ class AuthBackendArgs:
490
471
  @pulumi.getter(name="tokenNoDefaultPolicy")
491
472
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
492
473
  """
493
- If set, the default policy will not be set on
494
- generated tokens; otherwise it will be added to the policies set in token_policies.
474
+ If true, the 'default' policy will not automatically be added to generated tokens
495
475
  """
496
476
  return pulumi.get(self, "token_no_default_policy")
497
477
 
@@ -503,8 +483,7 @@ class AuthBackendArgs:
503
483
  @pulumi.getter(name="tokenNumUses")
504
484
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
505
485
  """
506
- The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
507
- of times a generated token may be used (within its lifetime); 0 means unlimited.
486
+ The maximum number of times a token may be used, a value of zero means unlimited
508
487
  """
509
488
  return pulumi.get(self, "token_num_uses")
510
489
 
@@ -516,10 +495,7 @@ class AuthBackendArgs:
516
495
  @pulumi.getter(name="tokenPeriod")
517
496
  def token_period(self) -> Optional[pulumi.Input[int]]:
518
497
  """
519
- If set, indicates that the
520
- token generated using this role should never expire. The token should be renewed within the
521
- duration specified by this value. At each renewal, the token's TTL will be set to the
522
- value of this field. Specified in seconds.
498
+ Generated Token's Period
523
499
  """
524
500
  return pulumi.get(self, "token_period")
525
501
 
@@ -531,8 +507,7 @@ class AuthBackendArgs:
531
507
  @pulumi.getter(name="tokenPolicies")
532
508
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
533
509
  """
534
- List of policies to encode onto generated tokens. Depending
535
- on the auth method, this list may be supplemented by user/group/other values.
510
+ Generated Token's Policies
536
511
  """
537
512
  return pulumi.get(self, "token_policies")
538
513
 
@@ -544,8 +519,7 @@ class AuthBackendArgs:
544
519
  @pulumi.getter(name="tokenTtl")
545
520
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
546
521
  """
547
- The incremental lifetime for generated tokens in number of seconds.
548
- Its current value will be referenced at renewal time.
522
+ The initial ttl of the token to generate in seconds
549
523
  """
550
524
  return pulumi.get(self, "token_ttl")
551
525
 
@@ -706,27 +680,14 @@ class _AuthBackendState:
706
680
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
707
681
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
708
682
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
709
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
710
- addresses which can authenticate successfully, and ties the resulting token to these blocks
711
- as well.
712
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
713
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
714
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
715
- `token_max_ttl` would otherwise allow a renewal.
716
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
717
- Its current value will be referenced at renewal time.
718
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
719
- generated tokens; otherwise it will be added to the policies set in token_policies.
720
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
721
- of times a generated token may be used (within its lifetime); 0 means unlimited.
722
- :param pulumi.Input[int] token_period: If set, indicates that the
723
- token generated using this role should never expire. The token should be renewed within the
724
- duration specified by this value. At each renewal, the token's TTL will be set to the
725
- value of this field. Specified in seconds.
726
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
727
- on the auth method, this list may be supplemented by user/group/other values.
728
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
729
- Its current value will be referenced at renewal time.
683
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
684
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
685
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
686
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
687
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
688
+ :param pulumi.Input[int] token_period: Generated Token's Period
689
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
690
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
730
691
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
731
692
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
732
693
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1080,9 +1041,7 @@ class _AuthBackendState:
1080
1041
  @pulumi.getter(name="tokenBoundCidrs")
1081
1042
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1082
1043
  """
1083
- List of CIDR blocks; if set, specifies blocks of IP
1084
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1085
- as well.
1044
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1086
1045
  """
1087
1046
  return pulumi.get(self, "token_bound_cidrs")
1088
1047
 
@@ -1094,10 +1053,7 @@ class _AuthBackendState:
1094
1053
  @pulumi.getter(name="tokenExplicitMaxTtl")
1095
1054
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
1096
1055
  """
1097
- If set, will encode an
1098
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1099
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1100
- `token_max_ttl` would otherwise allow a renewal.
1056
+ Generated Token's Explicit Maximum TTL in seconds
1101
1057
  """
1102
1058
  return pulumi.get(self, "token_explicit_max_ttl")
1103
1059
 
@@ -1109,8 +1065,7 @@ class _AuthBackendState:
1109
1065
  @pulumi.getter(name="tokenMaxTtl")
1110
1066
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
1111
1067
  """
1112
- The maximum lifetime for generated tokens in number of seconds.
1113
- Its current value will be referenced at renewal time.
1068
+ The maximum lifetime of the generated token
1114
1069
  """
1115
1070
  return pulumi.get(self, "token_max_ttl")
1116
1071
 
@@ -1122,8 +1077,7 @@ class _AuthBackendState:
1122
1077
  @pulumi.getter(name="tokenNoDefaultPolicy")
1123
1078
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
1124
1079
  """
1125
- If set, the default policy will not be set on
1126
- generated tokens; otherwise it will be added to the policies set in token_policies.
1080
+ If true, the 'default' policy will not automatically be added to generated tokens
1127
1081
  """
1128
1082
  return pulumi.get(self, "token_no_default_policy")
1129
1083
 
@@ -1135,8 +1089,7 @@ class _AuthBackendState:
1135
1089
  @pulumi.getter(name="tokenNumUses")
1136
1090
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
1137
1091
  """
1138
- The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1139
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1092
+ The maximum number of times a token may be used, a value of zero means unlimited
1140
1093
  """
1141
1094
  return pulumi.get(self, "token_num_uses")
1142
1095
 
@@ -1148,10 +1101,7 @@ class _AuthBackendState:
1148
1101
  @pulumi.getter(name="tokenPeriod")
1149
1102
  def token_period(self) -> Optional[pulumi.Input[int]]:
1150
1103
  """
1151
- If set, indicates that the
1152
- token generated using this role should never expire. The token should be renewed within the
1153
- duration specified by this value. At each renewal, the token's TTL will be set to the
1154
- value of this field. Specified in seconds.
1104
+ Generated Token's Period
1155
1105
  """
1156
1106
  return pulumi.get(self, "token_period")
1157
1107
 
@@ -1163,8 +1113,7 @@ class _AuthBackendState:
1163
1113
  @pulumi.getter(name="tokenPolicies")
1164
1114
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1165
1115
  """
1166
- List of policies to encode onto generated tokens. Depending
1167
- on the auth method, this list may be supplemented by user/group/other values.
1116
+ Generated Token's Policies
1168
1117
  """
1169
1118
  return pulumi.get(self, "token_policies")
1170
1119
 
@@ -1176,8 +1125,7 @@ class _AuthBackendState:
1176
1125
  @pulumi.getter(name="tokenTtl")
1177
1126
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1178
1127
  """
1179
- The incremental lifetime for generated tokens in number of seconds.
1180
- Its current value will be referenced at renewal time.
1128
+ The initial ttl of the token to generate in seconds
1181
1129
  """
1182
1130
  return pulumi.get(self, "token_ttl")
1183
1131
 
@@ -1330,7 +1278,6 @@ class AuthBackend(pulumi.CustomResource):
1330
1278
 
1331
1279
  ## Example Usage
1332
1280
 
1333
- <!--Start PulumiCodeChooser -->
1334
1281
  ```python
1335
1282
  import pulumi
1336
1283
  import pulumi_vault as vault
@@ -1345,7 +1292,6 @@ class AuthBackend(pulumi.CustomResource):
1345
1292
  groupdn="OU=Groups,DC=example,DC=org",
1346
1293
  groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1347
1294
  ```
1348
- <!--End PulumiCodeChooser -->
1349
1295
 
1350
1296
  ## Import
1351
1297
 
@@ -1381,27 +1327,14 @@ class AuthBackend(pulumi.CustomResource):
1381
1327
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1382
1328
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1383
1329
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1384
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1385
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1386
- as well.
1387
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1388
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1389
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1390
- `token_max_ttl` would otherwise allow a renewal.
1391
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1392
- Its current value will be referenced at renewal time.
1393
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1394
- generated tokens; otherwise it will be added to the policies set in token_policies.
1395
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1396
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1397
- :param pulumi.Input[int] token_period: If set, indicates that the
1398
- token generated using this role should never expire. The token should be renewed within the
1399
- duration specified by this value. At each renewal, the token's TTL will be set to the
1400
- value of this field. Specified in seconds.
1401
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1402
- on the auth method, this list may be supplemented by user/group/other values.
1403
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1404
- Its current value will be referenced at renewal time.
1330
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1331
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1332
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1333
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1334
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1335
+ :param pulumi.Input[int] token_period: Generated Token's Period
1336
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1337
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1405
1338
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1406
1339
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1407
1340
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1422,7 +1355,6 @@ class AuthBackend(pulumi.CustomResource):
1422
1355
 
1423
1356
  ## Example Usage
1424
1357
 
1425
- <!--Start PulumiCodeChooser -->
1426
1358
  ```python
1427
1359
  import pulumi
1428
1360
  import pulumi_vault as vault
@@ -1437,7 +1369,6 @@ class AuthBackend(pulumi.CustomResource):
1437
1369
  groupdn="OU=Groups,DC=example,DC=org",
1438
1370
  groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1439
1371
  ```
1440
- <!--End PulumiCodeChooser -->
1441
1372
 
1442
1373
  ## Import
1443
1374
 
@@ -1630,27 +1561,14 @@ class AuthBackend(pulumi.CustomResource):
1630
1561
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1631
1562
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1632
1563
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1633
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1634
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1635
- as well.
1636
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1637
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1638
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1639
- `token_max_ttl` would otherwise allow a renewal.
1640
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1641
- Its current value will be referenced at renewal time.
1642
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1643
- generated tokens; otherwise it will be added to the policies set in token_policies.
1644
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1645
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1646
- :param pulumi.Input[int] token_period: If set, indicates that the
1647
- token generated using this role should never expire. The token should be renewed within the
1648
- duration specified by this value. At each renewal, the token's TTL will be set to the
1649
- value of this field. Specified in seconds.
1650
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1651
- on the auth method, this list may be supplemented by user/group/other values.
1652
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1653
- Its current value will be referenced at renewal time.
1564
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1565
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1566
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1567
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1568
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1569
+ :param pulumi.Input[int] token_period: Generated Token's Period
1570
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1571
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1654
1572
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1655
1573
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1656
1574
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1883,9 +1801,7 @@ class AuthBackend(pulumi.CustomResource):
1883
1801
  @pulumi.getter(name="tokenBoundCidrs")
1884
1802
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1885
1803
  """
1886
- List of CIDR blocks; if set, specifies blocks of IP
1887
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1888
- as well.
1804
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1889
1805
  """
1890
1806
  return pulumi.get(self, "token_bound_cidrs")
1891
1807
 
@@ -1893,10 +1809,7 @@ class AuthBackend(pulumi.CustomResource):
1893
1809
  @pulumi.getter(name="tokenExplicitMaxTtl")
1894
1810
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1895
1811
  """
1896
- If set, will encode an
1897
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1898
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1899
- `token_max_ttl` would otherwise allow a renewal.
1812
+ Generated Token's Explicit Maximum TTL in seconds
1900
1813
  """
1901
1814
  return pulumi.get(self, "token_explicit_max_ttl")
1902
1815
 
@@ -1904,8 +1817,7 @@ class AuthBackend(pulumi.CustomResource):
1904
1817
  @pulumi.getter(name="tokenMaxTtl")
1905
1818
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1906
1819
  """
1907
- The maximum lifetime for generated tokens in number of seconds.
1908
- Its current value will be referenced at renewal time.
1820
+ The maximum lifetime of the generated token
1909
1821
  """
1910
1822
  return pulumi.get(self, "token_max_ttl")
1911
1823
 
@@ -1913,8 +1825,7 @@ class AuthBackend(pulumi.CustomResource):
1913
1825
  @pulumi.getter(name="tokenNoDefaultPolicy")
1914
1826
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1915
1827
  """
1916
- If set, the default policy will not be set on
1917
- generated tokens; otherwise it will be added to the policies set in token_policies.
1828
+ If true, the 'default' policy will not automatically be added to generated tokens
1918
1829
  """
1919
1830
  return pulumi.get(self, "token_no_default_policy")
1920
1831
 
@@ -1922,8 +1833,7 @@ class AuthBackend(pulumi.CustomResource):
1922
1833
  @pulumi.getter(name="tokenNumUses")
1923
1834
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1924
1835
  """
1925
- The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1926
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1836
+ The maximum number of times a token may be used, a value of zero means unlimited
1927
1837
  """
1928
1838
  return pulumi.get(self, "token_num_uses")
1929
1839
 
@@ -1931,10 +1841,7 @@ class AuthBackend(pulumi.CustomResource):
1931
1841
  @pulumi.getter(name="tokenPeriod")
1932
1842
  def token_period(self) -> pulumi.Output[Optional[int]]:
1933
1843
  """
1934
- If set, indicates that the
1935
- token generated using this role should never expire. The token should be renewed within the
1936
- duration specified by this value. At each renewal, the token's TTL will be set to the
1937
- value of this field. Specified in seconds.
1844
+ Generated Token's Period
1938
1845
  """
1939
1846
  return pulumi.get(self, "token_period")
1940
1847
 
@@ -1942,8 +1849,7 @@ class AuthBackend(pulumi.CustomResource):
1942
1849
  @pulumi.getter(name="tokenPolicies")
1943
1850
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1944
1851
  """
1945
- List of policies to encode onto generated tokens. Depending
1946
- on the auth method, this list may be supplemented by user/group/other values.
1852
+ Generated Token's Policies
1947
1853
  """
1948
1854
  return pulumi.get(self, "token_policies")
1949
1855
 
@@ -1951,8 +1857,7 @@ class AuthBackend(pulumi.CustomResource):
1951
1857
  @pulumi.getter(name="tokenTtl")
1952
1858
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1953
1859
  """
1954
- The incremental lifetime for generated tokens in number of seconds.
1955
- Its current value will be referenced at renewal time.
1860
+ The initial ttl of the token to generate in seconds
1956
1861
  """
1957
1862
  return pulumi.get(self, "token_ttl")
1958
1863