pulumi-vault 7.0.0a1750489873__py3-none-any.whl → 7.1.0a1752118888__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
pulumi_vault/__init__.py CHANGED
@@ -35,6 +35,7 @@ from .quota_rate_limit import *
35
35
  from .raft_autopilot import *
36
36
  from .raft_snapshot_agent_config import *
37
37
  from .rgp_policy import *
38
+ from .scep_auth_backend_role import *
38
39
  from .token import *
39
40
  from ._inputs import *
40
41
  from . import outputs
@@ -797,6 +798,14 @@ _utilities.register(
797
798
  "vault:index/rgpPolicy:RgpPolicy": "RgpPolicy"
798
799
  }
799
800
  },
801
+ {
802
+ "pkg": "vault",
803
+ "mod": "index/scepAuthBackendRole",
804
+ "fqn": "pulumi_vault",
805
+ "classes": {
806
+ "vault:index/scepAuthBackendRole:ScepAuthBackendRole": "ScepAuthBackendRole"
807
+ }
808
+ },
800
809
  {
801
810
  "pkg": "vault",
802
811
  "mod": "index/token",
@@ -1053,6 +1062,14 @@ _utilities.register(
1053
1062
  "vault:pkiSecret/backendConfigEst:BackendConfigEst": "BackendConfigEst"
1054
1063
  }
1055
1064
  },
1065
+ {
1066
+ "pkg": "vault",
1067
+ "mod": "pkiSecret/backendConfigScep",
1068
+ "fqn": "pulumi_vault.pkisecret",
1069
+ "classes": {
1070
+ "vault:pkiSecret/backendConfigScep:BackendConfigScep": "BackendConfigScep"
1071
+ }
1072
+ },
1056
1073
  {
1057
1074
  "pkg": "vault",
1058
1075
  "mod": "pkiSecret/secretBackendCert",
@@ -3546,6 +3546,10 @@ if not MYPY:
3546
3546
  """
3547
3547
  Version counter for root credential password write-only field
3548
3548
  """
3549
+ private_key_wo_version: NotRequired[pulumi.Input[builtins.int]]
3550
+ """
3551
+ Version counter for the private key key-pair credentials write-only field
3552
+ """
3549
3553
  username: NotRequired[pulumi.Input[builtins.str]]
3550
3554
  """
3551
3555
  The root credential username used in the connection URL
@@ -3566,6 +3570,7 @@ class SecretBackendConnectionSnowflakeArgs:
3566
3570
  max_open_connections: Optional[pulumi.Input[builtins.int]] = None,
3567
3571
  password: Optional[pulumi.Input[builtins.str]] = None,
3568
3572
  password_wo_version: Optional[pulumi.Input[builtins.int]] = None,
3573
+ private_key_wo_version: Optional[pulumi.Input[builtins.int]] = None,
3569
3574
  username: Optional[pulumi.Input[builtins.str]] = None,
3570
3575
  username_template: Optional[pulumi.Input[builtins.str]] = None):
3571
3576
  """
@@ -3575,6 +3580,7 @@ class SecretBackendConnectionSnowflakeArgs:
3575
3580
  :param pulumi.Input[builtins.int] max_open_connections: Maximum number of open connections to the database.
3576
3581
  :param pulumi.Input[builtins.str] password: The root credential password used in the connection URL
3577
3582
  :param pulumi.Input[builtins.int] password_wo_version: Version counter for root credential password write-only field
3583
+ :param pulumi.Input[builtins.int] private_key_wo_version: Version counter for the private key key-pair credentials write-only field
3578
3584
  :param pulumi.Input[builtins.str] username: The root credential username used in the connection URL
3579
3585
  :param pulumi.Input[builtins.str] username_template: Username generation template.
3580
3586
  """
@@ -3586,10 +3592,15 @@ class SecretBackendConnectionSnowflakeArgs:
3586
3592
  pulumi.set(__self__, "max_idle_connections", max_idle_connections)
3587
3593
  if max_open_connections is not None:
3588
3594
  pulumi.set(__self__, "max_open_connections", max_open_connections)
3595
+ if password is not None:
3596
+ warnings.warn("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""", DeprecationWarning)
3597
+ pulumi.log.warn("""password is deprecated: Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
3589
3598
  if password is not None:
3590
3599
  pulumi.set(__self__, "password", password)
3591
3600
  if password_wo_version is not None:
3592
3601
  pulumi.set(__self__, "password_wo_version", password_wo_version)
3602
+ if private_key_wo_version is not None:
3603
+ pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
3593
3604
  if username is not None:
3594
3605
  pulumi.set(__self__, "username", username)
3595
3606
  if username_template is not None:
@@ -3645,6 +3656,7 @@ class SecretBackendConnectionSnowflakeArgs:
3645
3656
 
3646
3657
  @property
3647
3658
  @pulumi.getter
3659
+ @_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
3648
3660
  def password(self) -> Optional[pulumi.Input[builtins.str]]:
3649
3661
  """
3650
3662
  The root credential password used in the connection URL
@@ -3667,6 +3679,18 @@ class SecretBackendConnectionSnowflakeArgs:
3667
3679
  def password_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
3668
3680
  pulumi.set(self, "password_wo_version", value)
3669
3681
 
3682
+ @property
3683
+ @pulumi.getter(name="privateKeyWoVersion")
3684
+ def private_key_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
3685
+ """
3686
+ Version counter for the private key key-pair credentials write-only field
3687
+ """
3688
+ return pulumi.get(self, "private_key_wo_version")
3689
+
3690
+ @private_key_wo_version.setter
3691
+ def private_key_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
3692
+ pulumi.set(self, "private_key_wo_version", value)
3693
+
3670
3694
  @property
3671
3695
  @pulumi.getter
3672
3696
  def username(self) -> Optional[pulumi.Input[builtins.str]]:
@@ -10960,6 +10984,10 @@ if not MYPY:
10960
10984
  """
10961
10985
  Specifies the name of the plugin to use.
10962
10986
  """
10987
+ private_key_wo_version: NotRequired[pulumi.Input[builtins.int]]
10988
+ """
10989
+ Version counter for the private key key-pair credentials write-only field
10990
+ """
10963
10991
  root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
10964
10992
  """
10965
10993
  A list of database statements to be executed to rotate the root user's credentials.
@@ -11010,6 +11038,7 @@ class SecretsMountSnowflakeArgs:
11010
11038
  password: Optional[pulumi.Input[builtins.str]] = None,
11011
11039
  password_wo_version: Optional[pulumi.Input[builtins.int]] = None,
11012
11040
  plugin_name: Optional[pulumi.Input[builtins.str]] = None,
11041
+ private_key_wo_version: Optional[pulumi.Input[builtins.int]] = None,
11013
11042
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
11014
11043
  rotation_period: Optional[pulumi.Input[builtins.int]] = None,
11015
11044
  rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
@@ -11032,6 +11061,7 @@ class SecretsMountSnowflakeArgs:
11032
11061
  :param pulumi.Input[builtins.str] password: The root credential password used in the connection URL
11033
11062
  :param pulumi.Input[builtins.int] password_wo_version: Version counter for root credential password write-only field
11034
11063
  :param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
11064
+ :param pulumi.Input[builtins.int] private_key_wo_version: Version counter for the private key key-pair credentials write-only field
11035
11065
  :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
11036
11066
  :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
11037
11067
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -11060,12 +11090,17 @@ class SecretsMountSnowflakeArgs:
11060
11090
  pulumi.set(__self__, "max_idle_connections", max_idle_connections)
11061
11091
  if max_open_connections is not None:
11062
11092
  pulumi.set(__self__, "max_open_connections", max_open_connections)
11093
+ if password is not None:
11094
+ warnings.warn("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""", DeprecationWarning)
11095
+ pulumi.log.warn("""password is deprecated: Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
11063
11096
  if password is not None:
11064
11097
  pulumi.set(__self__, "password", password)
11065
11098
  if password_wo_version is not None:
11066
11099
  pulumi.set(__self__, "password_wo_version", password_wo_version)
11067
11100
  if plugin_name is not None:
11068
11101
  pulumi.set(__self__, "plugin_name", plugin_name)
11102
+ if private_key_wo_version is not None:
11103
+ pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
11069
11104
  if root_rotation_statements is not None:
11070
11105
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
11071
11106
  if rotation_period is not None:
@@ -11182,6 +11217,7 @@ class SecretsMountSnowflakeArgs:
11182
11217
 
11183
11218
  @property
11184
11219
  @pulumi.getter
11220
+ @_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
11185
11221
  def password(self) -> Optional[pulumi.Input[builtins.str]]:
11186
11222
  """
11187
11223
  The root credential password used in the connection URL
@@ -11216,6 +11252,18 @@ class SecretsMountSnowflakeArgs:
11216
11252
  def plugin_name(self, value: Optional[pulumi.Input[builtins.str]]):
11217
11253
  pulumi.set(self, "plugin_name", value)
11218
11254
 
11255
+ @property
11256
+ @pulumi.getter(name="privateKeyWoVersion")
11257
+ def private_key_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
11258
+ """
11259
+ Version counter for the private key key-pair credentials write-only field
11260
+ """
11261
+ return pulumi.get(self, "private_key_wo_version")
11262
+
11263
+ @private_key_wo_version.setter
11264
+ def private_key_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
11265
+ pulumi.set(self, "private_key_wo_version", value)
11266
+
11219
11267
  @property
11220
11268
  @pulumi.getter(name="rootRotationStatements")
11221
11269
  def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
@@ -2586,6 +2586,8 @@ class SecretBackendConnectionSnowflake(dict):
2586
2586
  suggest = "max_open_connections"
2587
2587
  elif key == "passwordWoVersion":
2588
2588
  suggest = "password_wo_version"
2589
+ elif key == "privateKeyWoVersion":
2590
+ suggest = "private_key_wo_version"
2589
2591
  elif key == "usernameTemplate":
2590
2592
  suggest = "username_template"
2591
2593
 
@@ -2607,6 +2609,7 @@ class SecretBackendConnectionSnowflake(dict):
2607
2609
  max_open_connections: Optional[builtins.int] = None,
2608
2610
  password: Optional[builtins.str] = None,
2609
2611
  password_wo_version: Optional[builtins.int] = None,
2612
+ private_key_wo_version: Optional[builtins.int] = None,
2610
2613
  username: Optional[builtins.str] = None,
2611
2614
  username_template: Optional[builtins.str] = None):
2612
2615
  """
@@ -2616,6 +2619,7 @@ class SecretBackendConnectionSnowflake(dict):
2616
2619
  :param builtins.int max_open_connections: Maximum number of open connections to the database.
2617
2620
  :param builtins.str password: The root credential password used in the connection URL
2618
2621
  :param builtins.int password_wo_version: Version counter for root credential password write-only field
2622
+ :param builtins.int private_key_wo_version: Version counter for the private key key-pair credentials write-only field
2619
2623
  :param builtins.str username: The root credential username used in the connection URL
2620
2624
  :param builtins.str username_template: Username generation template.
2621
2625
  """
@@ -2631,6 +2635,8 @@ class SecretBackendConnectionSnowflake(dict):
2631
2635
  pulumi.set(__self__, "password", password)
2632
2636
  if password_wo_version is not None:
2633
2637
  pulumi.set(__self__, "password_wo_version", password_wo_version)
2638
+ if private_key_wo_version is not None:
2639
+ pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
2634
2640
  if username is not None:
2635
2641
  pulumi.set(__self__, "username", username)
2636
2642
  if username_template is not None:
@@ -2670,6 +2676,7 @@ class SecretBackendConnectionSnowflake(dict):
2670
2676
 
2671
2677
  @property
2672
2678
  @pulumi.getter
2679
+ @_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
2673
2680
  def password(self) -> Optional[builtins.str]:
2674
2681
  """
2675
2682
  The root credential password used in the connection URL
@@ -2684,6 +2691,14 @@ class SecretBackendConnectionSnowflake(dict):
2684
2691
  """
2685
2692
  return pulumi.get(self, "password_wo_version")
2686
2693
 
2694
+ @property
2695
+ @pulumi.getter(name="privateKeyWoVersion")
2696
+ def private_key_wo_version(self) -> Optional[builtins.int]:
2697
+ """
2698
+ Version counter for the private key key-pair credentials write-only field
2699
+ """
2700
+ return pulumi.get(self, "private_key_wo_version")
2701
+
2687
2702
  @property
2688
2703
  @pulumi.getter
2689
2704
  def username(self) -> Optional[builtins.str]:
@@ -7821,6 +7836,8 @@ class SecretsMountSnowflake(dict):
7821
7836
  suggest = "password_wo_version"
7822
7837
  elif key == "pluginName":
7823
7838
  suggest = "plugin_name"
7839
+ elif key == "privateKeyWoVersion":
7840
+ suggest = "private_key_wo_version"
7824
7841
  elif key == "rootRotationStatements":
7825
7842
  suggest = "root_rotation_statements"
7826
7843
  elif key == "rotationPeriod":
@@ -7857,6 +7874,7 @@ class SecretsMountSnowflake(dict):
7857
7874
  password: Optional[builtins.str] = None,
7858
7875
  password_wo_version: Optional[builtins.int] = None,
7859
7876
  plugin_name: Optional[builtins.str] = None,
7877
+ private_key_wo_version: Optional[builtins.int] = None,
7860
7878
  root_rotation_statements: Optional[Sequence[builtins.str]] = None,
7861
7879
  rotation_period: Optional[builtins.int] = None,
7862
7880
  rotation_schedule: Optional[builtins.str] = None,
@@ -7879,6 +7897,7 @@ class SecretsMountSnowflake(dict):
7879
7897
  :param builtins.str password: The root credential password used in the connection URL
7880
7898
  :param builtins.int password_wo_version: Version counter for root credential password write-only field
7881
7899
  :param builtins.str plugin_name: Specifies the name of the plugin to use.
7900
+ :param builtins.int private_key_wo_version: Version counter for the private key key-pair credentials write-only field
7882
7901
  :param Sequence[builtins.str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
7883
7902
  :param builtins.int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
7884
7903
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -7913,6 +7932,8 @@ class SecretsMountSnowflake(dict):
7913
7932
  pulumi.set(__self__, "password_wo_version", password_wo_version)
7914
7933
  if plugin_name is not None:
7915
7934
  pulumi.set(__self__, "plugin_name", plugin_name)
7935
+ if private_key_wo_version is not None:
7936
+ pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
7916
7937
  if root_rotation_statements is not None:
7917
7938
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
7918
7939
  if rotation_period is not None:
@@ -7997,6 +8018,7 @@ class SecretsMountSnowflake(dict):
7997
8018
 
7998
8019
  @property
7999
8020
  @pulumi.getter
8021
+ @_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
8000
8022
  def password(self) -> Optional[builtins.str]:
8001
8023
  """
8002
8024
  The root credential password used in the connection URL
@@ -8019,6 +8041,14 @@ class SecretsMountSnowflake(dict):
8019
8041
  """
8020
8042
  return pulumi.get(self, "plugin_name")
8021
8043
 
8044
+ @property
8045
+ @pulumi.getter(name="privateKeyWoVersion")
8046
+ def private_key_wo_version(self) -> Optional[builtins.int]:
8047
+ """
8048
+ Version counter for the private key key-pair credentials write-only field
8049
+ """
8050
+ return pulumi.get(self, "private_key_wo_version")
8051
+
8022
8052
  @property
8023
8053
  @pulumi.getter(name="rootRotationStatements")
8024
8054
  def root_rotation_statements(self) -> Optional[Sequence[builtins.str]]:
@@ -1106,6 +1106,11 @@ class SecretBackendConnection(pulumi.CustomResource):
1106
1106
  * `password_wo` - (Optional) The password for the user. Can be updated.
1107
1107
  **Note**: This property is write-only and will not be read from the API.
1108
1108
 
1109
+ The following write-only attribute is supported only for Snowflake DB:
1110
+
1111
+ * `private_key_wo` - (Optional) The private key associated with the Snowflake user.
1112
+ **Note**: This property is write-only and will not be read from the API.
1113
+
1109
1114
  ## Import
1110
1115
 
1111
1116
  Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
@@ -1195,6 +1200,11 @@ class SecretBackendConnection(pulumi.CustomResource):
1195
1200
  * `password_wo` - (Optional) The password for the user. Can be updated.
1196
1201
  **Note**: This property is write-only and will not be read from the API.
1197
1202
 
1203
+ The following write-only attribute is supported only for Snowflake DB:
1204
+
1205
+ * `private_key_wo` - (Optional) The private key associated with the Snowflake user.
1206
+ **Note**: This property is write-only and will not be read from the API.
1207
+
1198
1208
  ## Import
1199
1209
 
1200
1210
  Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
@@ -12,9 +12,11 @@ from .backend_config_auto_tidy import *
12
12
  from .backend_config_cluster import *
13
13
  from .backend_config_cmpv2 import *
14
14
  from .backend_config_est import *
15
+ from .backend_config_scep import *
15
16
  from .get_backend_cert_metadata import *
16
17
  from .get_backend_config_cmpv2 import *
17
18
  from .get_backend_config_est import *
19
+ from .get_backend_config_scep import *
18
20
  from .get_backend_issuer import *
19
21
  from .get_backend_issuers import *
20
22
  from .get_backend_key import *
@@ -20,6 +20,10 @@ __all__ = [
20
20
  'BackendConfigCmpv2AuthenticatorsArgsDict',
21
21
  'BackendConfigEstAuthenticatorsArgs',
22
22
  'BackendConfigEstAuthenticatorsArgsDict',
23
+ 'BackendConfigScepAuthenticatorsArgs',
24
+ 'BackendConfigScepAuthenticatorsArgsDict',
25
+ 'BackendConfigScepExternalValidationArgs',
26
+ 'BackendConfigScepExternalValidationArgsDict',
23
27
  'SecretBackendRolePolicyIdentifierArgs',
24
28
  'SecretBackendRolePolicyIdentifierArgsDict',
25
29
  ]
@@ -62,11 +66,11 @@ if not MYPY:
62
66
  class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
63
67
  cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
64
68
  """
65
- "The accessor (required) and cert_role (optional) properties for cert auth backends".
69
+ The accessor (required) and cert_role (optional) properties for cert auth backends.
66
70
  """
67
71
  userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
68
72
  """
69
- "The accessor (required) property for user pass auth backends".
73
+ The accessor (required) property for user pass auth backends.
70
74
  """
71
75
  elif False:
72
76
  BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
@@ -77,8 +81,8 @@ class BackendConfigEstAuthenticatorsArgs:
77
81
  cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
78
82
  userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
79
83
  """
80
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
81
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass: "The accessor (required) property for user pass auth backends".
84
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
85
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
82
86
  """
83
87
  if cert is not None:
84
88
  pulumi.set(__self__, "cert", cert)
@@ -89,7 +93,7 @@ class BackendConfigEstAuthenticatorsArgs:
89
93
  @pulumi.getter
90
94
  def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
91
95
  """
92
- "The accessor (required) and cert_role (optional) properties for cert auth backends".
96
+ The accessor (required) and cert_role (optional) properties for cert auth backends.
93
97
  """
94
98
  return pulumi.get(self, "cert")
95
99
 
@@ -101,7 +105,7 @@ class BackendConfigEstAuthenticatorsArgs:
101
105
  @pulumi.getter
102
106
  def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
103
107
  """
104
- "The accessor (required) property for user pass auth backends".
108
+ The accessor (required) property for user pass auth backends.
105
109
  """
106
110
  return pulumi.get(self, "userpass")
107
111
 
@@ -110,6 +114,90 @@ class BackendConfigEstAuthenticatorsArgs:
110
114
  pulumi.set(self, "userpass", value)
111
115
 
112
116
 
117
+ if not MYPY:
118
+ class BackendConfigScepAuthenticatorsArgsDict(TypedDict):
119
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
120
+ """
121
+ The accessor and cert_role properties for cert auth backends
122
+ """
123
+ scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
124
+ """
125
+ The accessor property for SCEP auth backends
126
+ """
127
+ elif False:
128
+ BackendConfigScepAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
129
+
130
+ @pulumi.input_type
131
+ class BackendConfigScepAuthenticatorsArgs:
132
+ def __init__(__self__, *,
133
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
134
+ scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
135
+ """
136
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
137
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] scep: The accessor property for SCEP auth backends
138
+ """
139
+ if cert is not None:
140
+ pulumi.set(__self__, "cert", cert)
141
+ if scep is not None:
142
+ pulumi.set(__self__, "scep", scep)
143
+
144
+ @property
145
+ @pulumi.getter
146
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
147
+ """
148
+ The accessor and cert_role properties for cert auth backends
149
+ """
150
+ return pulumi.get(self, "cert")
151
+
152
+ @cert.setter
153
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
154
+ pulumi.set(self, "cert", value)
155
+
156
+ @property
157
+ @pulumi.getter
158
+ def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
159
+ """
160
+ The accessor property for SCEP auth backends
161
+ """
162
+ return pulumi.get(self, "scep")
163
+
164
+ @scep.setter
165
+ def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
166
+ pulumi.set(self, "scep", value)
167
+
168
+
169
+ if not MYPY:
170
+ class BackendConfigScepExternalValidationArgsDict(TypedDict):
171
+ intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
172
+ """
173
+ The credentials to enable Microsoft Intune validation of SCEP requests
174
+ """
175
+ elif False:
176
+ BackendConfigScepExternalValidationArgsDict: TypeAlias = Mapping[str, Any]
177
+
178
+ @pulumi.input_type
179
+ class BackendConfigScepExternalValidationArgs:
180
+ def __init__(__self__, *,
181
+ intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
182
+ """
183
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
184
+ """
185
+ if intune is not None:
186
+ pulumi.set(__self__, "intune", intune)
187
+
188
+ @property
189
+ @pulumi.getter
190
+ def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
191
+ """
192
+ The credentials to enable Microsoft Intune validation of SCEP requests
193
+ """
194
+ return pulumi.get(self, "intune")
195
+
196
+ @intune.setter
197
+ def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
198
+ pulumi.set(self, "intune", value)
199
+
200
+
113
201
  if not MYPY:
114
202
  class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
115
203
  oid: pulumi.Input[builtins.str]