pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,51 +21,51 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class AuthBackendArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
organization: pulumi.Input[
|
26
|
-
base_url: Optional[pulumi.Input[
|
27
|
-
bypass_okta_mfa: Optional[pulumi.Input[
|
28
|
-
description: Optional[pulumi.Input[
|
29
|
-
disable_remount: Optional[pulumi.Input[
|
24
|
+
organization: pulumi.Input[_builtins.str],
|
25
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
27
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
29
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
|
31
|
-
namespace: Optional[pulumi.Input[
|
32
|
-
path: Optional[pulumi.Input[
|
33
|
-
token: Optional[pulumi.Input[
|
34
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
36
|
-
token_max_ttl: Optional[pulumi.Input[
|
37
|
-
token_no_default_policy: Optional[pulumi.Input[
|
38
|
-
token_num_uses: Optional[pulumi.Input[
|
39
|
-
token_period: Optional[pulumi.Input[
|
40
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
41
|
-
token_ttl: Optional[pulumi.Input[
|
42
|
-
token_type: Optional[pulumi.Input[
|
30
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
34
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
35
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
36
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
38
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
39
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
40
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
41
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
43
42
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
44
43
|
"""
|
45
44
|
The set of arguments for constructing a AuthBackend resource.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
50
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
46
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
47
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
48
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
49
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
51
50
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
52
51
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
|
53
52
|
See below for more details.
|
54
|
-
:param pulumi.Input[
|
53
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
55
54
|
The value should not contain leading or trailing forward slashes.
|
56
55
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
57
56
|
*Available only for Vault Enterprise*.
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
57
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
58
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
60
59
|
If this is not supplied only locally configured groups will be enabled.
|
61
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
62
|
-
:param pulumi.Input[
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[
|
65
|
-
:param pulumi.Input[
|
66
|
-
:param pulumi.Input[
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
68
|
-
:param pulumi.Input[
|
69
|
-
:param pulumi.Input[
|
60
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
61
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
62
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
63
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
64
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
65
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
66
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
67
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
68
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
70
69
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
71
70
|
See below for more details.
|
72
71
|
"""
|
@@ -108,57 +107,57 @@ class AuthBackendArgs:
|
|
108
107
|
if users is not None:
|
109
108
|
pulumi.set(__self__, "users", users)
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def organization(self) -> pulumi.Input[
|
112
|
+
def organization(self) -> pulumi.Input[_builtins.str]:
|
114
113
|
"""
|
115
114
|
The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
116
115
|
"""
|
117
116
|
return pulumi.get(self, "organization")
|
118
117
|
|
119
118
|
@organization.setter
|
120
|
-
def organization(self, value: pulumi.Input[
|
119
|
+
def organization(self, value: pulumi.Input[_builtins.str]):
|
121
120
|
pulumi.set(self, "organization", value)
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter(name="baseUrl")
|
125
|
-
def base_url(self) -> Optional[pulumi.Input[
|
124
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
126
125
|
"""
|
127
126
|
The Okta url. Examples: oktapreview.com, okta.com
|
128
127
|
"""
|
129
128
|
return pulumi.get(self, "base_url")
|
130
129
|
|
131
130
|
@base_url.setter
|
132
|
-
def base_url(self, value: Optional[pulumi.Input[
|
131
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
133
132
|
pulumi.set(self, "base_url", value)
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter(name="bypassOktaMfa")
|
137
|
-
def bypass_okta_mfa(self) -> Optional[pulumi.Input[
|
136
|
+
def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
138
137
|
"""
|
139
138
|
When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
140
139
|
"""
|
141
140
|
return pulumi.get(self, "bypass_okta_mfa")
|
142
141
|
|
143
142
|
@bypass_okta_mfa.setter
|
144
|
-
def bypass_okta_mfa(self, value: Optional[pulumi.Input[
|
143
|
+
def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
145
144
|
pulumi.set(self, "bypass_okta_mfa", value)
|
146
145
|
|
147
|
-
@property
|
146
|
+
@_builtins.property
|
148
147
|
@pulumi.getter
|
149
|
-
def description(self) -> Optional[pulumi.Input[
|
148
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
150
149
|
"""
|
151
150
|
The description of the auth backend
|
152
151
|
"""
|
153
152
|
return pulumi.get(self, "description")
|
154
153
|
|
155
154
|
@description.setter
|
156
|
-
def description(self, value: Optional[pulumi.Input[
|
155
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
157
156
|
pulumi.set(self, "description", value)
|
158
157
|
|
159
|
-
@property
|
158
|
+
@_builtins.property
|
160
159
|
@pulumi.getter(name="disableRemount")
|
161
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
160
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
162
161
|
"""
|
163
162
|
If set, opts out of mount migration on path updates.
|
164
163
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -166,10 +165,10 @@ class AuthBackendArgs:
|
|
166
165
|
return pulumi.get(self, "disable_remount")
|
167
166
|
|
168
167
|
@disable_remount.setter
|
169
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
168
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
170
169
|
pulumi.set(self, "disable_remount", value)
|
171
170
|
|
172
|
-
@property
|
171
|
+
@_builtins.property
|
173
172
|
@pulumi.getter
|
174
173
|
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
|
175
174
|
"""
|
@@ -182,9 +181,9 @@ class AuthBackendArgs:
|
|
182
181
|
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
|
183
182
|
pulumi.set(self, "groups", value)
|
184
183
|
|
185
|
-
@property
|
184
|
+
@_builtins.property
|
186
185
|
@pulumi.getter
|
187
|
-
def namespace(self) -> Optional[pulumi.Input[
|
186
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
188
187
|
"""
|
189
188
|
The namespace to provision the resource in.
|
190
189
|
The value should not contain leading or trailing forward slashes.
|
@@ -194,24 +193,24 @@ class AuthBackendArgs:
|
|
194
193
|
return pulumi.get(self, "namespace")
|
195
194
|
|
196
195
|
@namespace.setter
|
197
|
-
def namespace(self, value: Optional[pulumi.Input[
|
196
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
198
197
|
pulumi.set(self, "namespace", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter
|
202
|
-
def path(self) -> Optional[pulumi.Input[
|
201
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
203
202
|
"""
|
204
203
|
Path to mount the Okta auth backend. Default to path `okta`.
|
205
204
|
"""
|
206
205
|
return pulumi.get(self, "path")
|
207
206
|
|
208
207
|
@path.setter
|
209
|
-
def path(self, value: Optional[pulumi.Input[
|
208
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
210
209
|
pulumi.set(self, "path", value)
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
@pulumi.getter
|
214
|
-
def token(self) -> Optional[pulumi.Input[
|
213
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
215
214
|
"""
|
216
215
|
The Okta API token. This is required to query Okta for user group membership.
|
217
216
|
If this is not supplied only locally configured groups will be enabled.
|
@@ -219,118 +218,118 @@ class AuthBackendArgs:
|
|
219
218
|
return pulumi.get(self, "token")
|
220
219
|
|
221
220
|
@token.setter
|
222
|
-
def token(self, value: Optional[pulumi.Input[
|
221
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
223
222
|
pulumi.set(self, "token", value)
|
224
223
|
|
225
|
-
@property
|
224
|
+
@_builtins.property
|
226
225
|
@pulumi.getter(name="tokenBoundCidrs")
|
227
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
226
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
228
227
|
"""
|
229
228
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
230
229
|
"""
|
231
230
|
return pulumi.get(self, "token_bound_cidrs")
|
232
231
|
|
233
232
|
@token_bound_cidrs.setter
|
234
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
233
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
235
234
|
pulumi.set(self, "token_bound_cidrs", value)
|
236
235
|
|
237
|
-
@property
|
236
|
+
@_builtins.property
|
238
237
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
239
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
238
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
240
239
|
"""
|
241
240
|
Generated Token's Explicit Maximum TTL in seconds
|
242
241
|
"""
|
243
242
|
return pulumi.get(self, "token_explicit_max_ttl")
|
244
243
|
|
245
244
|
@token_explicit_max_ttl.setter
|
246
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
245
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
247
246
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
248
247
|
|
249
|
-
@property
|
248
|
+
@_builtins.property
|
250
249
|
@pulumi.getter(name="tokenMaxTtl")
|
251
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
250
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
252
251
|
"""
|
253
252
|
The maximum lifetime of the generated token
|
254
253
|
"""
|
255
254
|
return pulumi.get(self, "token_max_ttl")
|
256
255
|
|
257
256
|
@token_max_ttl.setter
|
258
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
257
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
259
258
|
pulumi.set(self, "token_max_ttl", value)
|
260
259
|
|
261
|
-
@property
|
260
|
+
@_builtins.property
|
262
261
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
263
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
262
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
264
263
|
"""
|
265
264
|
If true, the 'default' policy will not automatically be added to generated tokens
|
266
265
|
"""
|
267
266
|
return pulumi.get(self, "token_no_default_policy")
|
268
267
|
|
269
268
|
@token_no_default_policy.setter
|
270
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
269
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
271
270
|
pulumi.set(self, "token_no_default_policy", value)
|
272
271
|
|
273
|
-
@property
|
272
|
+
@_builtins.property
|
274
273
|
@pulumi.getter(name="tokenNumUses")
|
275
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
274
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
276
275
|
"""
|
277
276
|
The maximum number of times a token may be used, a value of zero means unlimited
|
278
277
|
"""
|
279
278
|
return pulumi.get(self, "token_num_uses")
|
280
279
|
|
281
280
|
@token_num_uses.setter
|
282
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
281
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
283
282
|
pulumi.set(self, "token_num_uses", value)
|
284
283
|
|
285
|
-
@property
|
284
|
+
@_builtins.property
|
286
285
|
@pulumi.getter(name="tokenPeriod")
|
287
|
-
def token_period(self) -> Optional[pulumi.Input[
|
286
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
288
287
|
"""
|
289
288
|
Generated Token's Period
|
290
289
|
"""
|
291
290
|
return pulumi.get(self, "token_period")
|
292
291
|
|
293
292
|
@token_period.setter
|
294
|
-
def token_period(self, value: Optional[pulumi.Input[
|
293
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
295
294
|
pulumi.set(self, "token_period", value)
|
296
295
|
|
297
|
-
@property
|
296
|
+
@_builtins.property
|
298
297
|
@pulumi.getter(name="tokenPolicies")
|
299
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
298
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
300
299
|
"""
|
301
300
|
Generated Token's Policies
|
302
301
|
"""
|
303
302
|
return pulumi.get(self, "token_policies")
|
304
303
|
|
305
304
|
@token_policies.setter
|
306
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
305
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
307
306
|
pulumi.set(self, "token_policies", value)
|
308
307
|
|
309
|
-
@property
|
308
|
+
@_builtins.property
|
310
309
|
@pulumi.getter(name="tokenTtl")
|
311
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
310
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
312
311
|
"""
|
313
312
|
The initial ttl of the token to generate in seconds
|
314
313
|
"""
|
315
314
|
return pulumi.get(self, "token_ttl")
|
316
315
|
|
317
316
|
@token_ttl.setter
|
318
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
317
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
319
318
|
pulumi.set(self, "token_ttl", value)
|
320
319
|
|
321
|
-
@property
|
320
|
+
@_builtins.property
|
322
321
|
@pulumi.getter(name="tokenType")
|
323
|
-
def token_type(self) -> Optional[pulumi.Input[
|
322
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
324
323
|
"""
|
325
324
|
The type of token to generate, service or batch
|
326
325
|
"""
|
327
326
|
return pulumi.get(self, "token_type")
|
328
327
|
|
329
328
|
@token_type.setter
|
330
|
-
def token_type(self, value: Optional[pulumi.Input[
|
329
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
331
330
|
pulumi.set(self, "token_type", value)
|
332
331
|
|
333
|
-
@property
|
332
|
+
@_builtins.property
|
334
333
|
@pulumi.getter
|
335
334
|
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
|
336
335
|
"""
|
@@ -347,53 +346,53 @@ class AuthBackendArgs:
|
|
347
346
|
@pulumi.input_type
|
348
347
|
class _AuthBackendState:
|
349
348
|
def __init__(__self__, *,
|
350
|
-
accessor: Optional[pulumi.Input[
|
351
|
-
base_url: Optional[pulumi.Input[
|
352
|
-
bypass_okta_mfa: Optional[pulumi.Input[
|
353
|
-
description: Optional[pulumi.Input[
|
354
|
-
disable_remount: Optional[pulumi.Input[
|
349
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
350
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
351
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
352
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
353
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
355
354
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
|
356
|
-
namespace: Optional[pulumi.Input[
|
357
|
-
organization: Optional[pulumi.Input[
|
358
|
-
path: Optional[pulumi.Input[
|
359
|
-
token: Optional[pulumi.Input[
|
360
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
361
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
362
|
-
token_max_ttl: Optional[pulumi.Input[
|
363
|
-
token_no_default_policy: Optional[pulumi.Input[
|
364
|
-
token_num_uses: Optional[pulumi.Input[
|
365
|
-
token_period: Optional[pulumi.Input[
|
366
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
367
|
-
token_ttl: Optional[pulumi.Input[
|
368
|
-
token_type: Optional[pulumi.Input[
|
355
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
356
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
357
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
358
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
359
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
360
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
361
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
362
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
363
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
364
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
365
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
366
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
367
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
369
368
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
370
369
|
"""
|
371
370
|
Input properties used for looking up and filtering AuthBackend resources.
|
372
|
-
:param pulumi.Input[
|
373
|
-
:param pulumi.Input[
|
374
|
-
:param pulumi.Input[
|
375
|
-
:param pulumi.Input[
|
376
|
-
:param pulumi.Input[
|
371
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
372
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
373
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
374
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
375
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
377
376
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
378
377
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
|
379
378
|
See below for more details.
|
380
|
-
:param pulumi.Input[
|
379
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
381
380
|
The value should not contain leading or trailing forward slashes.
|
382
381
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
383
382
|
*Available only for Vault Enterprise*.
|
384
|
-
:param pulumi.Input[
|
385
|
-
:param pulumi.Input[
|
386
|
-
:param pulumi.Input[
|
383
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
384
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
385
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
387
386
|
If this is not supplied only locally configured groups will be enabled.
|
388
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
389
|
-
:param pulumi.Input[
|
390
|
-
:param pulumi.Input[
|
391
|
-
:param pulumi.Input[
|
392
|
-
:param pulumi.Input[
|
393
|
-
:param pulumi.Input[
|
394
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
395
|
-
:param pulumi.Input[
|
396
|
-
:param pulumi.Input[
|
387
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
388
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
389
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
390
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
391
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
392
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
393
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
394
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
395
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
397
396
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
398
397
|
See below for more details.
|
399
398
|
"""
|
@@ -438,57 +437,57 @@ class _AuthBackendState:
|
|
438
437
|
if users is not None:
|
439
438
|
pulumi.set(__self__, "users", users)
|
440
439
|
|
441
|
-
@property
|
440
|
+
@_builtins.property
|
442
441
|
@pulumi.getter
|
443
|
-
def accessor(self) -> Optional[pulumi.Input[
|
442
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
444
443
|
"""
|
445
444
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
446
445
|
"""
|
447
446
|
return pulumi.get(self, "accessor")
|
448
447
|
|
449
448
|
@accessor.setter
|
450
|
-
def accessor(self, value: Optional[pulumi.Input[
|
449
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
451
450
|
pulumi.set(self, "accessor", value)
|
452
451
|
|
453
|
-
@property
|
452
|
+
@_builtins.property
|
454
453
|
@pulumi.getter(name="baseUrl")
|
455
|
-
def base_url(self) -> Optional[pulumi.Input[
|
454
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
456
455
|
"""
|
457
456
|
The Okta url. Examples: oktapreview.com, okta.com
|
458
457
|
"""
|
459
458
|
return pulumi.get(self, "base_url")
|
460
459
|
|
461
460
|
@base_url.setter
|
462
|
-
def base_url(self, value: Optional[pulumi.Input[
|
461
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
463
462
|
pulumi.set(self, "base_url", value)
|
464
463
|
|
465
|
-
@property
|
464
|
+
@_builtins.property
|
466
465
|
@pulumi.getter(name="bypassOktaMfa")
|
467
|
-
def bypass_okta_mfa(self) -> Optional[pulumi.Input[
|
466
|
+
def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
468
467
|
"""
|
469
468
|
When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
470
469
|
"""
|
471
470
|
return pulumi.get(self, "bypass_okta_mfa")
|
472
471
|
|
473
472
|
@bypass_okta_mfa.setter
|
474
|
-
def bypass_okta_mfa(self, value: Optional[pulumi.Input[
|
473
|
+
def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
475
474
|
pulumi.set(self, "bypass_okta_mfa", value)
|
476
475
|
|
477
|
-
@property
|
476
|
+
@_builtins.property
|
478
477
|
@pulumi.getter
|
479
|
-
def description(self) -> Optional[pulumi.Input[
|
478
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
480
479
|
"""
|
481
480
|
The description of the auth backend
|
482
481
|
"""
|
483
482
|
return pulumi.get(self, "description")
|
484
483
|
|
485
484
|
@description.setter
|
486
|
-
def description(self, value: Optional[pulumi.Input[
|
485
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
487
486
|
pulumi.set(self, "description", value)
|
488
487
|
|
489
|
-
@property
|
488
|
+
@_builtins.property
|
490
489
|
@pulumi.getter(name="disableRemount")
|
491
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
490
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
492
491
|
"""
|
493
492
|
If set, opts out of mount migration on path updates.
|
494
493
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -496,10 +495,10 @@ class _AuthBackendState:
|
|
496
495
|
return pulumi.get(self, "disable_remount")
|
497
496
|
|
498
497
|
@disable_remount.setter
|
499
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
498
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
500
499
|
pulumi.set(self, "disable_remount", value)
|
501
500
|
|
502
|
-
@property
|
501
|
+
@_builtins.property
|
503
502
|
@pulumi.getter
|
504
503
|
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
|
505
504
|
"""
|
@@ -512,9 +511,9 @@ class _AuthBackendState:
|
|
512
511
|
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
|
513
512
|
pulumi.set(self, "groups", value)
|
514
513
|
|
515
|
-
@property
|
514
|
+
@_builtins.property
|
516
515
|
@pulumi.getter
|
517
|
-
def namespace(self) -> Optional[pulumi.Input[
|
516
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
518
517
|
"""
|
519
518
|
The namespace to provision the resource in.
|
520
519
|
The value should not contain leading or trailing forward slashes.
|
@@ -524,36 +523,36 @@ class _AuthBackendState:
|
|
524
523
|
return pulumi.get(self, "namespace")
|
525
524
|
|
526
525
|
@namespace.setter
|
527
|
-
def namespace(self, value: Optional[pulumi.Input[
|
526
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
528
527
|
pulumi.set(self, "namespace", value)
|
529
528
|
|
530
|
-
@property
|
529
|
+
@_builtins.property
|
531
530
|
@pulumi.getter
|
532
|
-
def organization(self) -> Optional[pulumi.Input[
|
531
|
+
def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
|
533
532
|
"""
|
534
533
|
The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
535
534
|
"""
|
536
535
|
return pulumi.get(self, "organization")
|
537
536
|
|
538
537
|
@organization.setter
|
539
|
-
def organization(self, value: Optional[pulumi.Input[
|
538
|
+
def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
|
540
539
|
pulumi.set(self, "organization", value)
|
541
540
|
|
542
|
-
@property
|
541
|
+
@_builtins.property
|
543
542
|
@pulumi.getter
|
544
|
-
def path(self) -> Optional[pulumi.Input[
|
543
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
545
544
|
"""
|
546
545
|
Path to mount the Okta auth backend. Default to path `okta`.
|
547
546
|
"""
|
548
547
|
return pulumi.get(self, "path")
|
549
548
|
|
550
549
|
@path.setter
|
551
|
-
def path(self, value: Optional[pulumi.Input[
|
550
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
552
551
|
pulumi.set(self, "path", value)
|
553
552
|
|
554
|
-
@property
|
553
|
+
@_builtins.property
|
555
554
|
@pulumi.getter
|
556
|
-
def token(self) -> Optional[pulumi.Input[
|
555
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
557
556
|
"""
|
558
557
|
The Okta API token. This is required to query Okta for user group membership.
|
559
558
|
If this is not supplied only locally configured groups will be enabled.
|
@@ -561,118 +560,118 @@ class _AuthBackendState:
|
|
561
560
|
return pulumi.get(self, "token")
|
562
561
|
|
563
562
|
@token.setter
|
564
|
-
def token(self, value: Optional[pulumi.Input[
|
563
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
565
564
|
pulumi.set(self, "token", value)
|
566
565
|
|
567
|
-
@property
|
566
|
+
@_builtins.property
|
568
567
|
@pulumi.getter(name="tokenBoundCidrs")
|
569
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
568
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
570
569
|
"""
|
571
570
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
572
571
|
"""
|
573
572
|
return pulumi.get(self, "token_bound_cidrs")
|
574
573
|
|
575
574
|
@token_bound_cidrs.setter
|
576
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
575
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
577
576
|
pulumi.set(self, "token_bound_cidrs", value)
|
578
577
|
|
579
|
-
@property
|
578
|
+
@_builtins.property
|
580
579
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
581
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
580
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
582
581
|
"""
|
583
582
|
Generated Token's Explicit Maximum TTL in seconds
|
584
583
|
"""
|
585
584
|
return pulumi.get(self, "token_explicit_max_ttl")
|
586
585
|
|
587
586
|
@token_explicit_max_ttl.setter
|
588
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
587
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
589
588
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
590
589
|
|
591
|
-
@property
|
590
|
+
@_builtins.property
|
592
591
|
@pulumi.getter(name="tokenMaxTtl")
|
593
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
592
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
594
593
|
"""
|
595
594
|
The maximum lifetime of the generated token
|
596
595
|
"""
|
597
596
|
return pulumi.get(self, "token_max_ttl")
|
598
597
|
|
599
598
|
@token_max_ttl.setter
|
600
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
599
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
601
600
|
pulumi.set(self, "token_max_ttl", value)
|
602
601
|
|
603
|
-
@property
|
602
|
+
@_builtins.property
|
604
603
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
605
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
604
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
606
605
|
"""
|
607
606
|
If true, the 'default' policy will not automatically be added to generated tokens
|
608
607
|
"""
|
609
608
|
return pulumi.get(self, "token_no_default_policy")
|
610
609
|
|
611
610
|
@token_no_default_policy.setter
|
612
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
611
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
613
612
|
pulumi.set(self, "token_no_default_policy", value)
|
614
613
|
|
615
|
-
@property
|
614
|
+
@_builtins.property
|
616
615
|
@pulumi.getter(name="tokenNumUses")
|
617
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
616
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
618
617
|
"""
|
619
618
|
The maximum number of times a token may be used, a value of zero means unlimited
|
620
619
|
"""
|
621
620
|
return pulumi.get(self, "token_num_uses")
|
622
621
|
|
623
622
|
@token_num_uses.setter
|
624
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
623
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
625
624
|
pulumi.set(self, "token_num_uses", value)
|
626
625
|
|
627
|
-
@property
|
626
|
+
@_builtins.property
|
628
627
|
@pulumi.getter(name="tokenPeriod")
|
629
|
-
def token_period(self) -> Optional[pulumi.Input[
|
628
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
630
629
|
"""
|
631
630
|
Generated Token's Period
|
632
631
|
"""
|
633
632
|
return pulumi.get(self, "token_period")
|
634
633
|
|
635
634
|
@token_period.setter
|
636
|
-
def token_period(self, value: Optional[pulumi.Input[
|
635
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
637
636
|
pulumi.set(self, "token_period", value)
|
638
637
|
|
639
|
-
@property
|
638
|
+
@_builtins.property
|
640
639
|
@pulumi.getter(name="tokenPolicies")
|
641
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
640
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
642
641
|
"""
|
643
642
|
Generated Token's Policies
|
644
643
|
"""
|
645
644
|
return pulumi.get(self, "token_policies")
|
646
645
|
|
647
646
|
@token_policies.setter
|
648
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
647
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
649
648
|
pulumi.set(self, "token_policies", value)
|
650
649
|
|
651
|
-
@property
|
650
|
+
@_builtins.property
|
652
651
|
@pulumi.getter(name="tokenTtl")
|
653
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
652
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
654
653
|
"""
|
655
654
|
The initial ttl of the token to generate in seconds
|
656
655
|
"""
|
657
656
|
return pulumi.get(self, "token_ttl")
|
658
657
|
|
659
658
|
@token_ttl.setter
|
660
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
659
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
661
660
|
pulumi.set(self, "token_ttl", value)
|
662
661
|
|
663
|
-
@property
|
662
|
+
@_builtins.property
|
664
663
|
@pulumi.getter(name="tokenType")
|
665
|
-
def token_type(self) -> Optional[pulumi.Input[
|
664
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
666
665
|
"""
|
667
666
|
The type of token to generate, service or batch
|
668
667
|
"""
|
669
668
|
return pulumi.get(self, "token_type")
|
670
669
|
|
671
670
|
@token_type.setter
|
672
|
-
def token_type(self, value: Optional[pulumi.Input[
|
671
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
673
672
|
pulumi.set(self, "token_type", value)
|
674
673
|
|
675
|
-
@property
|
674
|
+
@_builtins.property
|
676
675
|
@pulumi.getter
|
677
676
|
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
|
678
677
|
"""
|
@@ -692,24 +691,24 @@ class AuthBackend(pulumi.CustomResource):
|
|
692
691
|
def __init__(__self__,
|
693
692
|
resource_name: str,
|
694
693
|
opts: Optional[pulumi.ResourceOptions] = None,
|
695
|
-
base_url: Optional[pulumi.Input[
|
696
|
-
bypass_okta_mfa: Optional[pulumi.Input[
|
697
|
-
description: Optional[pulumi.Input[
|
698
|
-
disable_remount: Optional[pulumi.Input[
|
694
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
695
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
696
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
697
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
699
698
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
700
|
-
namespace: Optional[pulumi.Input[
|
701
|
-
organization: Optional[pulumi.Input[
|
702
|
-
path: Optional[pulumi.Input[
|
703
|
-
token: Optional[pulumi.Input[
|
704
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
705
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
706
|
-
token_max_ttl: Optional[pulumi.Input[
|
707
|
-
token_no_default_policy: Optional[pulumi.Input[
|
708
|
-
token_num_uses: Optional[pulumi.Input[
|
709
|
-
token_period: Optional[pulumi.Input[
|
710
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
711
|
-
token_ttl: Optional[pulumi.Input[
|
712
|
-
token_type: Optional[pulumi.Input[
|
699
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
700
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
701
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
702
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
703
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
704
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
705
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
706
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
707
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
708
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
709
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
710
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
711
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
713
712
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
714
713
|
__props__=None):
|
715
714
|
"""
|
@@ -749,30 +748,30 @@ class AuthBackend(pulumi.CustomResource):
|
|
749
748
|
|
750
749
|
:param str resource_name: The name of the resource.
|
751
750
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
752
|
-
:param pulumi.Input[
|
753
|
-
:param pulumi.Input[
|
754
|
-
:param pulumi.Input[
|
755
|
-
:param pulumi.Input[
|
751
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
752
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
753
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
754
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
756
755
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
757
756
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
758
757
|
See below for more details.
|
759
|
-
:param pulumi.Input[
|
758
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
760
759
|
The value should not contain leading or trailing forward slashes.
|
761
760
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
762
761
|
*Available only for Vault Enterprise*.
|
763
|
-
:param pulumi.Input[
|
764
|
-
:param pulumi.Input[
|
765
|
-
:param pulumi.Input[
|
762
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
763
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
764
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
766
765
|
If this is not supplied only locally configured groups will be enabled.
|
767
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
768
|
-
:param pulumi.Input[
|
769
|
-
:param pulumi.Input[
|
770
|
-
:param pulumi.Input[
|
771
|
-
:param pulumi.Input[
|
772
|
-
:param pulumi.Input[
|
773
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
774
|
-
:param pulumi.Input[
|
775
|
-
:param pulumi.Input[
|
766
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
767
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
768
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
769
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
770
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
771
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
772
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
773
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
774
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
776
775
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
777
776
|
See below for more details.
|
778
777
|
"""
|
@@ -832,24 +831,24 @@ class AuthBackend(pulumi.CustomResource):
|
|
832
831
|
def _internal_init(__self__,
|
833
832
|
resource_name: str,
|
834
833
|
opts: Optional[pulumi.ResourceOptions] = None,
|
835
|
-
base_url: Optional[pulumi.Input[
|
836
|
-
bypass_okta_mfa: Optional[pulumi.Input[
|
837
|
-
description: Optional[pulumi.Input[
|
838
|
-
disable_remount: Optional[pulumi.Input[
|
834
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
835
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
836
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
837
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
839
838
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
840
|
-
namespace: Optional[pulumi.Input[
|
841
|
-
organization: Optional[pulumi.Input[
|
842
|
-
path: Optional[pulumi.Input[
|
843
|
-
token: Optional[pulumi.Input[
|
844
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
845
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
846
|
-
token_max_ttl: Optional[pulumi.Input[
|
847
|
-
token_no_default_policy: Optional[pulumi.Input[
|
848
|
-
token_num_uses: Optional[pulumi.Input[
|
849
|
-
token_period: Optional[pulumi.Input[
|
850
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
851
|
-
token_ttl: Optional[pulumi.Input[
|
852
|
-
token_type: Optional[pulumi.Input[
|
839
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
840
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
841
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
842
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
843
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
844
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
845
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
846
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
847
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
848
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
849
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
850
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
851
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
853
852
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
854
853
|
__props__=None):
|
855
854
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -894,25 +893,25 @@ class AuthBackend(pulumi.CustomResource):
|
|
894
893
|
def get(resource_name: str,
|
895
894
|
id: pulumi.Input[str],
|
896
895
|
opts: Optional[pulumi.ResourceOptions] = None,
|
897
|
-
accessor: Optional[pulumi.Input[
|
898
|
-
base_url: Optional[pulumi.Input[
|
899
|
-
bypass_okta_mfa: Optional[pulumi.Input[
|
900
|
-
description: Optional[pulumi.Input[
|
901
|
-
disable_remount: Optional[pulumi.Input[
|
896
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
897
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
898
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
899
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
900
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
902
901
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
903
|
-
namespace: Optional[pulumi.Input[
|
904
|
-
organization: Optional[pulumi.Input[
|
905
|
-
path: Optional[pulumi.Input[
|
906
|
-
token: Optional[pulumi.Input[
|
907
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
908
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
909
|
-
token_max_ttl: Optional[pulumi.Input[
|
910
|
-
token_no_default_policy: Optional[pulumi.Input[
|
911
|
-
token_num_uses: Optional[pulumi.Input[
|
912
|
-
token_period: Optional[pulumi.Input[
|
913
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
914
|
-
token_ttl: Optional[pulumi.Input[
|
915
|
-
token_type: Optional[pulumi.Input[
|
902
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
903
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
904
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
905
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
906
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
907
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
908
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
909
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
910
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
911
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
912
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
913
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
914
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
916
915
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
|
917
916
|
"""
|
918
917
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
@@ -921,31 +920,31 @@ class AuthBackend(pulumi.CustomResource):
|
|
921
920
|
:param str resource_name: The unique name of the resulting resource.
|
922
921
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
923
922
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
924
|
-
:param pulumi.Input[
|
925
|
-
:param pulumi.Input[
|
926
|
-
:param pulumi.Input[
|
927
|
-
:param pulumi.Input[
|
928
|
-
:param pulumi.Input[
|
923
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
924
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
925
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
926
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
927
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
929
928
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
930
929
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
931
930
|
See below for more details.
|
932
|
-
:param pulumi.Input[
|
931
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
933
932
|
The value should not contain leading or trailing forward slashes.
|
934
933
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
935
934
|
*Available only for Vault Enterprise*.
|
936
|
-
:param pulumi.Input[
|
937
|
-
:param pulumi.Input[
|
938
|
-
:param pulumi.Input[
|
935
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
936
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
937
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
939
938
|
If this is not supplied only locally configured groups will be enabled.
|
940
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
941
|
-
:param pulumi.Input[
|
942
|
-
:param pulumi.Input[
|
943
|
-
:param pulumi.Input[
|
944
|
-
:param pulumi.Input[
|
945
|
-
:param pulumi.Input[
|
946
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
947
|
-
:param pulumi.Input[
|
948
|
-
:param pulumi.Input[
|
939
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
940
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
941
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
942
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
943
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
944
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
945
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
946
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
947
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
949
948
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
950
949
|
See below for more details.
|
951
950
|
"""
|
@@ -975,48 +974,48 @@ class AuthBackend(pulumi.CustomResource):
|
|
975
974
|
__props__.__dict__["users"] = users
|
976
975
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
977
976
|
|
978
|
-
@property
|
977
|
+
@_builtins.property
|
979
978
|
@pulumi.getter
|
980
|
-
def accessor(self) -> pulumi.Output[
|
979
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
981
980
|
"""
|
982
981
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
983
982
|
"""
|
984
983
|
return pulumi.get(self, "accessor")
|
985
984
|
|
986
|
-
@property
|
985
|
+
@_builtins.property
|
987
986
|
@pulumi.getter(name="baseUrl")
|
988
|
-
def base_url(self) -> pulumi.Output[Optional[
|
987
|
+
def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
|
989
988
|
"""
|
990
989
|
The Okta url. Examples: oktapreview.com, okta.com
|
991
990
|
"""
|
992
991
|
return pulumi.get(self, "base_url")
|
993
992
|
|
994
|
-
@property
|
993
|
+
@_builtins.property
|
995
994
|
@pulumi.getter(name="bypassOktaMfa")
|
996
|
-
def bypass_okta_mfa(self) -> pulumi.Output[Optional[
|
995
|
+
def bypass_okta_mfa(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
997
996
|
"""
|
998
997
|
When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
999
998
|
"""
|
1000
999
|
return pulumi.get(self, "bypass_okta_mfa")
|
1001
1000
|
|
1002
|
-
@property
|
1001
|
+
@_builtins.property
|
1003
1002
|
@pulumi.getter
|
1004
|
-
def description(self) -> pulumi.Output[Optional[
|
1003
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1005
1004
|
"""
|
1006
1005
|
The description of the auth backend
|
1007
1006
|
"""
|
1008
1007
|
return pulumi.get(self, "description")
|
1009
1008
|
|
1010
|
-
@property
|
1009
|
+
@_builtins.property
|
1011
1010
|
@pulumi.getter(name="disableRemount")
|
1012
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1011
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1013
1012
|
"""
|
1014
1013
|
If set, opts out of mount migration on path updates.
|
1015
1014
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1016
1015
|
"""
|
1017
1016
|
return pulumi.get(self, "disable_remount")
|
1018
1017
|
|
1019
|
-
@property
|
1018
|
+
@_builtins.property
|
1020
1019
|
@pulumi.getter
|
1021
1020
|
def groups(self) -> pulumi.Output[Sequence['outputs.AuthBackendGroup']]:
|
1022
1021
|
"""
|
@@ -1025,9 +1024,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
1025
1024
|
"""
|
1026
1025
|
return pulumi.get(self, "groups")
|
1027
1026
|
|
1028
|
-
@property
|
1027
|
+
@_builtins.property
|
1029
1028
|
@pulumi.getter
|
1030
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1029
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1031
1030
|
"""
|
1032
1031
|
The namespace to provision the resource in.
|
1033
1032
|
The value should not contain leading or trailing forward slashes.
|
@@ -1036,104 +1035,104 @@ class AuthBackend(pulumi.CustomResource):
|
|
1036
1035
|
"""
|
1037
1036
|
return pulumi.get(self, "namespace")
|
1038
1037
|
|
1039
|
-
@property
|
1038
|
+
@_builtins.property
|
1040
1039
|
@pulumi.getter
|
1041
|
-
def organization(self) -> pulumi.Output[
|
1040
|
+
def organization(self) -> pulumi.Output[_builtins.str]:
|
1042
1041
|
"""
|
1043
1042
|
The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
1044
1043
|
"""
|
1045
1044
|
return pulumi.get(self, "organization")
|
1046
1045
|
|
1047
|
-
@property
|
1046
|
+
@_builtins.property
|
1048
1047
|
@pulumi.getter
|
1049
|
-
def path(self) -> pulumi.Output[Optional[
|
1048
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1050
1049
|
"""
|
1051
1050
|
Path to mount the Okta auth backend. Default to path `okta`.
|
1052
1051
|
"""
|
1053
1052
|
return pulumi.get(self, "path")
|
1054
1053
|
|
1055
|
-
@property
|
1054
|
+
@_builtins.property
|
1056
1055
|
@pulumi.getter
|
1057
|
-
def token(self) -> pulumi.Output[Optional[
|
1056
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1058
1057
|
"""
|
1059
1058
|
The Okta API token. This is required to query Okta for user group membership.
|
1060
1059
|
If this is not supplied only locally configured groups will be enabled.
|
1061
1060
|
"""
|
1062
1061
|
return pulumi.get(self, "token")
|
1063
1062
|
|
1064
|
-
@property
|
1063
|
+
@_builtins.property
|
1065
1064
|
@pulumi.getter(name="tokenBoundCidrs")
|
1066
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[
|
1065
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1067
1066
|
"""
|
1068
1067
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1069
1068
|
"""
|
1070
1069
|
return pulumi.get(self, "token_bound_cidrs")
|
1071
1070
|
|
1072
|
-
@property
|
1071
|
+
@_builtins.property
|
1073
1072
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1074
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[
|
1073
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1075
1074
|
"""
|
1076
1075
|
Generated Token's Explicit Maximum TTL in seconds
|
1077
1076
|
"""
|
1078
1077
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1079
1078
|
|
1080
|
-
@property
|
1079
|
+
@_builtins.property
|
1081
1080
|
@pulumi.getter(name="tokenMaxTtl")
|
1082
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
1081
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1083
1082
|
"""
|
1084
1083
|
The maximum lifetime of the generated token
|
1085
1084
|
"""
|
1086
1085
|
return pulumi.get(self, "token_max_ttl")
|
1087
1086
|
|
1088
|
-
@property
|
1087
|
+
@_builtins.property
|
1089
1088
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1090
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[
|
1089
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1091
1090
|
"""
|
1092
1091
|
If true, the 'default' policy will not automatically be added to generated tokens
|
1093
1092
|
"""
|
1094
1093
|
return pulumi.get(self, "token_no_default_policy")
|
1095
1094
|
|
1096
|
-
@property
|
1095
|
+
@_builtins.property
|
1097
1096
|
@pulumi.getter(name="tokenNumUses")
|
1098
|
-
def token_num_uses(self) -> pulumi.Output[Optional[
|
1097
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1099
1098
|
"""
|
1100
1099
|
The maximum number of times a token may be used, a value of zero means unlimited
|
1101
1100
|
"""
|
1102
1101
|
return pulumi.get(self, "token_num_uses")
|
1103
1102
|
|
1104
|
-
@property
|
1103
|
+
@_builtins.property
|
1105
1104
|
@pulumi.getter(name="tokenPeriod")
|
1106
|
-
def token_period(self) -> pulumi.Output[Optional[
|
1105
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1107
1106
|
"""
|
1108
1107
|
Generated Token's Period
|
1109
1108
|
"""
|
1110
1109
|
return pulumi.get(self, "token_period")
|
1111
1110
|
|
1112
|
-
@property
|
1111
|
+
@_builtins.property
|
1113
1112
|
@pulumi.getter(name="tokenPolicies")
|
1114
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[
|
1113
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1115
1114
|
"""
|
1116
1115
|
Generated Token's Policies
|
1117
1116
|
"""
|
1118
1117
|
return pulumi.get(self, "token_policies")
|
1119
1118
|
|
1120
|
-
@property
|
1119
|
+
@_builtins.property
|
1121
1120
|
@pulumi.getter(name="tokenTtl")
|
1122
|
-
def token_ttl(self) -> pulumi.Output[Optional[
|
1121
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1123
1122
|
"""
|
1124
1123
|
The initial ttl of the token to generate in seconds
|
1125
1124
|
"""
|
1126
1125
|
return pulumi.get(self, "token_ttl")
|
1127
1126
|
|
1128
|
-
@property
|
1127
|
+
@_builtins.property
|
1129
1128
|
@pulumi.getter(name="tokenType")
|
1130
|
-
def token_type(self) -> pulumi.Output[Optional[
|
1129
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1131
1130
|
"""
|
1132
1131
|
The type of token to generate, service or batch
|
1133
1132
|
"""
|
1134
1133
|
return pulumi.get(self, "token_type")
|
1135
1134
|
|
1136
|
-
@property
|
1135
|
+
@_builtins.property
|
1137
1136
|
@pulumi.getter
|
1138
1137
|
def users(self) -> pulumi.Output[Sequence['outputs.AuthBackendUser']]:
|
1139
1138
|
"""
|