pulumi-vault 7.0.0a1750489873__py3-none-any.whl → 7.1.0a1752118888__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +17 -0
- pulumi_vault/database/_inputs.py +48 -0
- pulumi_vault/database/outputs.py +30 -0
- pulumi_vault/database/secret_backend_connection.py +10 -0
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +94 -6
- pulumi_vault/pkisecret/backend_config_scep.py +692 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +252 -0
- pulumi_vault/pkisecret/outputs.py +112 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +61 -14
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_rate_limit.py +153 -3
- pulumi_vault/scep_auth_backend_role.py +855 -0
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_cmac.py +257 -0
- pulumi_vault/transit/get_verify.py +16 -1
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/METADATA +1 -1
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/RECORD +20 -16
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,252 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import builtins
|
6
|
+
import copy
|
7
|
+
import warnings
|
8
|
+
import sys
|
9
|
+
import pulumi
|
10
|
+
import pulumi.runtime
|
11
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
12
|
+
if sys.version_info >= (3, 11):
|
13
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
14
|
+
else:
|
15
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
16
|
+
from .. import _utilities
|
17
|
+
from . import outputs
|
18
|
+
|
19
|
+
__all__ = [
|
20
|
+
'GetBackendConfigScepResult',
|
21
|
+
'AwaitableGetBackendConfigScepResult',
|
22
|
+
'get_backend_config_scep',
|
23
|
+
'get_backend_config_scep_output',
|
24
|
+
]
|
25
|
+
|
26
|
+
@pulumi.output_type
|
27
|
+
class GetBackendConfigScepResult:
|
28
|
+
"""
|
29
|
+
A collection of values returned by getBackendConfigScep.
|
30
|
+
"""
|
31
|
+
def __init__(__self__, allowed_digest_algorithms=None, allowed_encryption_algorithms=None, authenticators=None, backend=None, default_path_policy=None, enabled=None, external_validations=None, id=None, last_updated=None, namespace=None, restrict_ca_chain_to_issuer=None):
|
32
|
+
if allowed_digest_algorithms and not isinstance(allowed_digest_algorithms, list):
|
33
|
+
raise TypeError("Expected argument 'allowed_digest_algorithms' to be a list")
|
34
|
+
pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
|
35
|
+
if allowed_encryption_algorithms and not isinstance(allowed_encryption_algorithms, list):
|
36
|
+
raise TypeError("Expected argument 'allowed_encryption_algorithms' to be a list")
|
37
|
+
pulumi.set(__self__, "allowed_encryption_algorithms", allowed_encryption_algorithms)
|
38
|
+
if authenticators and not isinstance(authenticators, list):
|
39
|
+
raise TypeError("Expected argument 'authenticators' to be a list")
|
40
|
+
pulumi.set(__self__, "authenticators", authenticators)
|
41
|
+
if backend and not isinstance(backend, str):
|
42
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
43
|
+
pulumi.set(__self__, "backend", backend)
|
44
|
+
if default_path_policy and not isinstance(default_path_policy, str):
|
45
|
+
raise TypeError("Expected argument 'default_path_policy' to be a str")
|
46
|
+
pulumi.set(__self__, "default_path_policy", default_path_policy)
|
47
|
+
if enabled and not isinstance(enabled, bool):
|
48
|
+
raise TypeError("Expected argument 'enabled' to be a bool")
|
49
|
+
pulumi.set(__self__, "enabled", enabled)
|
50
|
+
if external_validations and not isinstance(external_validations, list):
|
51
|
+
raise TypeError("Expected argument 'external_validations' to be a list")
|
52
|
+
pulumi.set(__self__, "external_validations", external_validations)
|
53
|
+
if id and not isinstance(id, str):
|
54
|
+
raise TypeError("Expected argument 'id' to be a str")
|
55
|
+
pulumi.set(__self__, "id", id)
|
56
|
+
if last_updated and not isinstance(last_updated, str):
|
57
|
+
raise TypeError("Expected argument 'last_updated' to be a str")
|
58
|
+
pulumi.set(__self__, "last_updated", last_updated)
|
59
|
+
if namespace and not isinstance(namespace, str):
|
60
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
61
|
+
pulumi.set(__self__, "namespace", namespace)
|
62
|
+
if restrict_ca_chain_to_issuer and not isinstance(restrict_ca_chain_to_issuer, bool):
|
63
|
+
raise TypeError("Expected argument 'restrict_ca_chain_to_issuer' to be a bool")
|
64
|
+
pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
|
65
|
+
|
66
|
+
@property
|
67
|
+
@pulumi.getter(name="allowedDigestAlgorithms")
|
68
|
+
def allowed_digest_algorithms(self) -> Sequence[builtins.str]:
|
69
|
+
"""
|
70
|
+
List of allowed digest algorithms for SCEP requests.
|
71
|
+
"""
|
72
|
+
return pulumi.get(self, "allowed_digest_algorithms")
|
73
|
+
|
74
|
+
@property
|
75
|
+
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
76
|
+
def allowed_encryption_algorithms(self) -> Sequence[builtins.str]:
|
77
|
+
"""
|
78
|
+
List of allowed encryption algorithms for SCEP requests.
|
79
|
+
"""
|
80
|
+
return pulumi.get(self, "allowed_encryption_algorithms")
|
81
|
+
|
82
|
+
@property
|
83
|
+
@pulumi.getter
|
84
|
+
def authenticators(self) -> Sequence['outputs.GetBackendConfigScepAuthenticatorResult']:
|
85
|
+
"""
|
86
|
+
Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
87
|
+
"""
|
88
|
+
return pulumi.get(self, "authenticators")
|
89
|
+
|
90
|
+
@property
|
91
|
+
@pulumi.getter
|
92
|
+
def backend(self) -> builtins.str:
|
93
|
+
return pulumi.get(self, "backend")
|
94
|
+
|
95
|
+
@property
|
96
|
+
@pulumi.getter(name="defaultPathPolicy")
|
97
|
+
def default_path_policy(self) -> builtins.str:
|
98
|
+
"""
|
99
|
+
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
100
|
+
"""
|
101
|
+
return pulumi.get(self, "default_path_policy")
|
102
|
+
|
103
|
+
@property
|
104
|
+
@pulumi.getter
|
105
|
+
def enabled(self) -> builtins.bool:
|
106
|
+
"""
|
107
|
+
Specifies whether SCEP is enabled.
|
108
|
+
"""
|
109
|
+
return pulumi.get(self, "enabled")
|
110
|
+
|
111
|
+
@property
|
112
|
+
@pulumi.getter(name="externalValidations")
|
113
|
+
def external_validations(self) -> Sequence['outputs.GetBackendConfigScepExternalValidationResult']:
|
114
|
+
"""
|
115
|
+
Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
116
|
+
"""
|
117
|
+
return pulumi.get(self, "external_validations")
|
118
|
+
|
119
|
+
@property
|
120
|
+
@pulumi.getter
|
121
|
+
def id(self) -> builtins.str:
|
122
|
+
"""
|
123
|
+
The provider-assigned unique ID for this managed resource.
|
124
|
+
"""
|
125
|
+
return pulumi.get(self, "id")
|
126
|
+
|
127
|
+
@property
|
128
|
+
@pulumi.getter(name="lastUpdated")
|
129
|
+
def last_updated(self) -> builtins.str:
|
130
|
+
"""
|
131
|
+
A read-only timestamp representing the last time the configuration was updated.
|
132
|
+
"""
|
133
|
+
return pulumi.get(self, "last_updated")
|
134
|
+
|
135
|
+
@property
|
136
|
+
@pulumi.getter
|
137
|
+
def namespace(self) -> Optional[builtins.str]:
|
138
|
+
return pulumi.get(self, "namespace")
|
139
|
+
|
140
|
+
@property
|
141
|
+
@pulumi.getter(name="restrictCaChainToIssuer")
|
142
|
+
def restrict_ca_chain_to_issuer(self) -> builtins.bool:
|
143
|
+
"""
|
144
|
+
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
145
|
+
"""
|
146
|
+
return pulumi.get(self, "restrict_ca_chain_to_issuer")
|
147
|
+
|
148
|
+
|
149
|
+
class AwaitableGetBackendConfigScepResult(GetBackendConfigScepResult):
|
150
|
+
# pylint: disable=using-constant-test
|
151
|
+
def __await__(self):
|
152
|
+
if False:
|
153
|
+
yield self
|
154
|
+
return GetBackendConfigScepResult(
|
155
|
+
allowed_digest_algorithms=self.allowed_digest_algorithms,
|
156
|
+
allowed_encryption_algorithms=self.allowed_encryption_algorithms,
|
157
|
+
authenticators=self.authenticators,
|
158
|
+
backend=self.backend,
|
159
|
+
default_path_policy=self.default_path_policy,
|
160
|
+
enabled=self.enabled,
|
161
|
+
external_validations=self.external_validations,
|
162
|
+
id=self.id,
|
163
|
+
last_updated=self.last_updated,
|
164
|
+
namespace=self.namespace,
|
165
|
+
restrict_ca_chain_to_issuer=self.restrict_ca_chain_to_issuer)
|
166
|
+
|
167
|
+
|
168
|
+
def get_backend_config_scep(backend: Optional[builtins.str] = None,
|
169
|
+
namespace: Optional[builtins.str] = None,
|
170
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigScepResult:
|
171
|
+
"""
|
172
|
+
## Example Usage
|
173
|
+
|
174
|
+
```python
|
175
|
+
import pulumi
|
176
|
+
import pulumi_vault as vault
|
177
|
+
|
178
|
+
pki = vault.Mount("pki",
|
179
|
+
path="pki",
|
180
|
+
type="pki",
|
181
|
+
description="PKI secret engine mount")
|
182
|
+
scep_config = vault.pkiSecret.get_backend_config_scep_output(backend=pki.path)
|
183
|
+
```
|
184
|
+
|
185
|
+
|
186
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
187
|
+
read the SCEP configuration from, with no leading or trailing `/`s.
|
188
|
+
:param builtins.str namespace: The namespace of the target resource.
|
189
|
+
The value should not contain leading or trailing forward slashes.
|
190
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
191
|
+
*Available only for Vault Enterprise*.
|
192
|
+
"""
|
193
|
+
__args__ = dict()
|
194
|
+
__args__['backend'] = backend
|
195
|
+
__args__['namespace'] = namespace
|
196
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
197
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult).value
|
198
|
+
|
199
|
+
return AwaitableGetBackendConfigScepResult(
|
200
|
+
allowed_digest_algorithms=pulumi.get(__ret__, 'allowed_digest_algorithms'),
|
201
|
+
allowed_encryption_algorithms=pulumi.get(__ret__, 'allowed_encryption_algorithms'),
|
202
|
+
authenticators=pulumi.get(__ret__, 'authenticators'),
|
203
|
+
backend=pulumi.get(__ret__, 'backend'),
|
204
|
+
default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
|
205
|
+
enabled=pulumi.get(__ret__, 'enabled'),
|
206
|
+
external_validations=pulumi.get(__ret__, 'external_validations'),
|
207
|
+
id=pulumi.get(__ret__, 'id'),
|
208
|
+
last_updated=pulumi.get(__ret__, 'last_updated'),
|
209
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
210
|
+
restrict_ca_chain_to_issuer=pulumi.get(__ret__, 'restrict_ca_chain_to_issuer'))
|
211
|
+
def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
212
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
213
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigScepResult]:
|
214
|
+
"""
|
215
|
+
## Example Usage
|
216
|
+
|
217
|
+
```python
|
218
|
+
import pulumi
|
219
|
+
import pulumi_vault as vault
|
220
|
+
|
221
|
+
pki = vault.Mount("pki",
|
222
|
+
path="pki",
|
223
|
+
type="pki",
|
224
|
+
description="PKI secret engine mount")
|
225
|
+
scep_config = vault.pkiSecret.get_backend_config_scep_output(backend=pki.path)
|
226
|
+
```
|
227
|
+
|
228
|
+
|
229
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
230
|
+
read the SCEP configuration from, with no leading or trailing `/`s.
|
231
|
+
:param builtins.str namespace: The namespace of the target resource.
|
232
|
+
The value should not contain leading or trailing forward slashes.
|
233
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
234
|
+
*Available only for Vault Enterprise*.
|
235
|
+
"""
|
236
|
+
__args__ = dict()
|
237
|
+
__args__['backend'] = backend
|
238
|
+
__args__['namespace'] = namespace
|
239
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
240
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult)
|
241
|
+
return __ret__.apply(lambda __response__: GetBackendConfigScepResult(
|
242
|
+
allowed_digest_algorithms=pulumi.get(__response__, 'allowed_digest_algorithms'),
|
243
|
+
allowed_encryption_algorithms=pulumi.get(__response__, 'allowed_encryption_algorithms'),
|
244
|
+
authenticators=pulumi.get(__response__, 'authenticators'),
|
245
|
+
backend=pulumi.get(__response__, 'backend'),
|
246
|
+
default_path_policy=pulumi.get(__response__, 'default_path_policy'),
|
247
|
+
enabled=pulumi.get(__response__, 'enabled'),
|
248
|
+
external_validations=pulumi.get(__response__, 'external_validations'),
|
249
|
+
id=pulumi.get(__response__, 'id'),
|
250
|
+
last_updated=pulumi.get(__response__, 'last_updated'),
|
251
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
252
|
+
restrict_ca_chain_to_issuer=pulumi.get(__response__, 'restrict_ca_chain_to_issuer')))
|
@@ -18,9 +18,13 @@ from .. import _utilities
|
|
18
18
|
__all__ = [
|
19
19
|
'BackendConfigCmpv2Authenticators',
|
20
20
|
'BackendConfigEstAuthenticators',
|
21
|
+
'BackendConfigScepAuthenticators',
|
22
|
+
'BackendConfigScepExternalValidation',
|
21
23
|
'SecretBackendRolePolicyIdentifier',
|
22
24
|
'GetBackendConfigCmpv2AuthenticatorResult',
|
23
25
|
'GetBackendConfigEstAuthenticatorResult',
|
26
|
+
'GetBackendConfigScepAuthenticatorResult',
|
27
|
+
'GetBackendConfigScepExternalValidationResult',
|
24
28
|
]
|
25
29
|
|
26
30
|
@pulumi.output_type
|
@@ -48,8 +52,8 @@ class BackendConfigEstAuthenticators(dict):
|
|
48
52
|
cert: Optional[Mapping[str, builtins.str]] = None,
|
49
53
|
userpass: Optional[Mapping[str, builtins.str]] = None):
|
50
54
|
"""
|
51
|
-
:param Mapping[str, builtins.str] cert:
|
52
|
-
:param Mapping[str, builtins.str] userpass:
|
55
|
+
:param Mapping[str, builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
|
56
|
+
:param Mapping[str, builtins.str] userpass: The accessor (required) property for user pass auth backends.
|
53
57
|
"""
|
54
58
|
if cert is not None:
|
55
59
|
pulumi.set(__self__, "cert", cert)
|
@@ -60,7 +64,7 @@ class BackendConfigEstAuthenticators(dict):
|
|
60
64
|
@pulumi.getter
|
61
65
|
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
62
66
|
"""
|
63
|
-
|
67
|
+
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
64
68
|
"""
|
65
69
|
return pulumi.get(self, "cert")
|
66
70
|
|
@@ -68,11 +72,61 @@ class BackendConfigEstAuthenticators(dict):
|
|
68
72
|
@pulumi.getter
|
69
73
|
def userpass(self) -> Optional[Mapping[str, builtins.str]]:
|
70
74
|
"""
|
71
|
-
|
75
|
+
The accessor (required) property for user pass auth backends.
|
72
76
|
"""
|
73
77
|
return pulumi.get(self, "userpass")
|
74
78
|
|
75
79
|
|
80
|
+
@pulumi.output_type
|
81
|
+
class BackendConfigScepAuthenticators(dict):
|
82
|
+
def __init__(__self__, *,
|
83
|
+
cert: Optional[Mapping[str, builtins.str]] = None,
|
84
|
+
scep: Optional[Mapping[str, builtins.str]] = None):
|
85
|
+
"""
|
86
|
+
:param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends
|
87
|
+
:param Mapping[str, builtins.str] scep: The accessor property for SCEP auth backends
|
88
|
+
"""
|
89
|
+
if cert is not None:
|
90
|
+
pulumi.set(__self__, "cert", cert)
|
91
|
+
if scep is not None:
|
92
|
+
pulumi.set(__self__, "scep", scep)
|
93
|
+
|
94
|
+
@property
|
95
|
+
@pulumi.getter
|
96
|
+
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
97
|
+
"""
|
98
|
+
The accessor and cert_role properties for cert auth backends
|
99
|
+
"""
|
100
|
+
return pulumi.get(self, "cert")
|
101
|
+
|
102
|
+
@property
|
103
|
+
@pulumi.getter
|
104
|
+
def scep(self) -> Optional[Mapping[str, builtins.str]]:
|
105
|
+
"""
|
106
|
+
The accessor property for SCEP auth backends
|
107
|
+
"""
|
108
|
+
return pulumi.get(self, "scep")
|
109
|
+
|
110
|
+
|
111
|
+
@pulumi.output_type
|
112
|
+
class BackendConfigScepExternalValidation(dict):
|
113
|
+
def __init__(__self__, *,
|
114
|
+
intune: Optional[Mapping[str, builtins.str]] = None):
|
115
|
+
"""
|
116
|
+
:param Mapping[str, builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
|
117
|
+
"""
|
118
|
+
if intune is not None:
|
119
|
+
pulumi.set(__self__, "intune", intune)
|
120
|
+
|
121
|
+
@property
|
122
|
+
@pulumi.getter
|
123
|
+
def intune(self) -> Optional[Mapping[str, builtins.str]]:
|
124
|
+
"""
|
125
|
+
The credentials to enable Microsoft Intune validation of SCEP requests
|
126
|
+
"""
|
127
|
+
return pulumi.get(self, "intune")
|
128
|
+
|
129
|
+
|
76
130
|
@pulumi.output_type
|
77
131
|
class SecretBackendRolePolicyIdentifier(dict):
|
78
132
|
def __init__(__self__, *,
|
@@ -140,8 +194,8 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
140
194
|
cert: Optional[Mapping[str, builtins.str]] = None,
|
141
195
|
userpass: Optional[Mapping[str, builtins.str]] = None):
|
142
196
|
"""
|
143
|
-
:param Mapping[str, builtins.str] cert:
|
144
|
-
:param Mapping[str, builtins.str] userpass:
|
197
|
+
:param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends.
|
198
|
+
:param Mapping[str, builtins.str] userpass: The accessor property for user pass auth backends.
|
145
199
|
"""
|
146
200
|
if cert is not None:
|
147
201
|
pulumi.set(__self__, "cert", cert)
|
@@ -152,7 +206,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
152
206
|
@pulumi.getter
|
153
207
|
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
154
208
|
"""
|
155
|
-
|
209
|
+
The accessor and cert_role properties for cert auth backends.
|
156
210
|
"""
|
157
211
|
return pulumi.get(self, "cert")
|
158
212
|
|
@@ -160,8 +214,58 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
160
214
|
@pulumi.getter
|
161
215
|
def userpass(self) -> Optional[Mapping[str, builtins.str]]:
|
162
216
|
"""
|
163
|
-
|
217
|
+
The accessor property for user pass auth backends.
|
164
218
|
"""
|
165
219
|
return pulumi.get(self, "userpass")
|
166
220
|
|
167
221
|
|
222
|
+
@pulumi.output_type
|
223
|
+
class GetBackendConfigScepAuthenticatorResult(dict):
|
224
|
+
def __init__(__self__, *,
|
225
|
+
cert: Optional[Mapping[str, builtins.str]] = None,
|
226
|
+
scep: Optional[Mapping[str, builtins.str]] = None):
|
227
|
+
"""
|
228
|
+
:param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends.
|
229
|
+
:param Mapping[str, builtins.str] scep: The accessor property for scep auth backends.
|
230
|
+
"""
|
231
|
+
if cert is not None:
|
232
|
+
pulumi.set(__self__, "cert", cert)
|
233
|
+
if scep is not None:
|
234
|
+
pulumi.set(__self__, "scep", scep)
|
235
|
+
|
236
|
+
@property
|
237
|
+
@pulumi.getter
|
238
|
+
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
239
|
+
"""
|
240
|
+
The accessor and cert_role properties for cert auth backends.
|
241
|
+
"""
|
242
|
+
return pulumi.get(self, "cert")
|
243
|
+
|
244
|
+
@property
|
245
|
+
@pulumi.getter
|
246
|
+
def scep(self) -> Optional[Mapping[str, builtins.str]]:
|
247
|
+
"""
|
248
|
+
The accessor property for scep auth backends.
|
249
|
+
"""
|
250
|
+
return pulumi.get(self, "scep")
|
251
|
+
|
252
|
+
|
253
|
+
@pulumi.output_type
|
254
|
+
class GetBackendConfigScepExternalValidationResult(dict):
|
255
|
+
def __init__(__self__, *,
|
256
|
+
intune: Optional[Mapping[str, builtins.str]] = None):
|
257
|
+
"""
|
258
|
+
:param Mapping[str, builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
|
259
|
+
"""
|
260
|
+
if intune is not None:
|
261
|
+
pulumi.set(__self__, "intune", intune)
|
262
|
+
|
263
|
+
@property
|
264
|
+
@pulumi.getter
|
265
|
+
def intune(self) -> Optional[Mapping[str, builtins.str]]:
|
266
|
+
"""
|
267
|
+
The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
|
268
|
+
"""
|
269
|
+
return pulumi.get(self, "intune")
|
270
|
+
|
271
|
+
|