pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_duo.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,27 +19,27 @@ __all__ = ['MfaDuoArgs', 'MfaDuo']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class MfaDuoArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
api_hostname: pulumi.Input[
|
24
|
-
integration_key: pulumi.Input[
|
25
|
-
mount_accessor: pulumi.Input[
|
26
|
-
secret_key: pulumi.Input[
|
27
|
-
name: Optional[pulumi.Input[
|
28
|
-
namespace: Optional[pulumi.Input[
|
29
|
-
push_info: Optional[pulumi.Input[
|
30
|
-
username_format: Optional[pulumi.Input[
|
22
|
+
api_hostname: pulumi.Input[_builtins.str],
|
23
|
+
integration_key: pulumi.Input[_builtins.str],
|
24
|
+
mount_accessor: pulumi.Input[_builtins.str],
|
25
|
+
secret_key: pulumi.Input[_builtins.str],
|
26
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
push_info: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a MfaDuo resource.
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] api_hostname: `(string: <required>)` - API hostname for Duo.
|
33
|
+
:param pulumi.Input[_builtins.str] integration_key: `(string: <required>)` - Integration key for Duo.
|
34
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
35
|
+
:param pulumi.Input[_builtins.str] secret_key: `(string: <required>)` - Secret key for Duo.
|
36
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
37
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
39
38
|
The value should not contain leading or trailing forward slashes.
|
40
39
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
40
|
*Available only for Vault Enterprise*.
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] push_info: `(string)` - Push information for Duo.
|
42
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
44
43
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
45
44
|
- entity.name: The name configured for the Entity
|
46
45
|
- alias.metadata.`<key>`: The value of the Alias's metadata parameter
|
@@ -59,69 +58,69 @@ class MfaDuoArgs:
|
|
59
58
|
if username_format is not None:
|
60
59
|
pulumi.set(__self__, "username_format", username_format)
|
61
60
|
|
62
|
-
@property
|
61
|
+
@_builtins.property
|
63
62
|
@pulumi.getter(name="apiHostname")
|
64
|
-
def api_hostname(self) -> pulumi.Input[
|
63
|
+
def api_hostname(self) -> pulumi.Input[_builtins.str]:
|
65
64
|
"""
|
66
65
|
`(string: <required>)` - API hostname for Duo.
|
67
66
|
"""
|
68
67
|
return pulumi.get(self, "api_hostname")
|
69
68
|
|
70
69
|
@api_hostname.setter
|
71
|
-
def api_hostname(self, value: pulumi.Input[
|
70
|
+
def api_hostname(self, value: pulumi.Input[_builtins.str]):
|
72
71
|
pulumi.set(self, "api_hostname", value)
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter(name="integrationKey")
|
76
|
-
def integration_key(self) -> pulumi.Input[
|
75
|
+
def integration_key(self) -> pulumi.Input[_builtins.str]:
|
77
76
|
"""
|
78
77
|
`(string: <required>)` - Integration key for Duo.
|
79
78
|
"""
|
80
79
|
return pulumi.get(self, "integration_key")
|
81
80
|
|
82
81
|
@integration_key.setter
|
83
|
-
def integration_key(self, value: pulumi.Input[
|
82
|
+
def integration_key(self, value: pulumi.Input[_builtins.str]):
|
84
83
|
pulumi.set(self, "integration_key", value)
|
85
84
|
|
86
|
-
@property
|
85
|
+
@_builtins.property
|
87
86
|
@pulumi.getter(name="mountAccessor")
|
88
|
-
def mount_accessor(self) -> pulumi.Input[
|
87
|
+
def mount_accessor(self) -> pulumi.Input[_builtins.str]:
|
89
88
|
"""
|
90
89
|
`(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
91
90
|
"""
|
92
91
|
return pulumi.get(self, "mount_accessor")
|
93
92
|
|
94
93
|
@mount_accessor.setter
|
95
|
-
def mount_accessor(self, value: pulumi.Input[
|
94
|
+
def mount_accessor(self, value: pulumi.Input[_builtins.str]):
|
96
95
|
pulumi.set(self, "mount_accessor", value)
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter(name="secretKey")
|
100
|
-
def secret_key(self) -> pulumi.Input[
|
99
|
+
def secret_key(self) -> pulumi.Input[_builtins.str]:
|
101
100
|
"""
|
102
101
|
`(string: <required>)` - Secret key for Duo.
|
103
102
|
"""
|
104
103
|
return pulumi.get(self, "secret_key")
|
105
104
|
|
106
105
|
@secret_key.setter
|
107
|
-
def secret_key(self, value: pulumi.Input[
|
106
|
+
def secret_key(self, value: pulumi.Input[_builtins.str]):
|
108
107
|
pulumi.set(self, "secret_key", value)
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter
|
112
|
-
def name(self) -> Optional[pulumi.Input[
|
111
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
113
112
|
"""
|
114
113
|
`(string: <required>)` – Name of the MFA method.
|
115
114
|
"""
|
116
115
|
return pulumi.get(self, "name")
|
117
116
|
|
118
117
|
@name.setter
|
119
|
-
def name(self, value: Optional[pulumi.Input[
|
118
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
120
119
|
pulumi.set(self, "name", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter
|
124
|
-
def namespace(self) -> Optional[pulumi.Input[
|
123
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
The namespace to provision the resource in.
|
127
126
|
The value should not contain leading or trailing forward slashes.
|
@@ -131,24 +130,24 @@ class MfaDuoArgs:
|
|
131
130
|
return pulumi.get(self, "namespace")
|
132
131
|
|
133
132
|
@namespace.setter
|
134
|
-
def namespace(self, value: Optional[pulumi.Input[
|
133
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
135
134
|
pulumi.set(self, "namespace", value)
|
136
135
|
|
137
|
-
@property
|
136
|
+
@_builtins.property
|
138
137
|
@pulumi.getter(name="pushInfo")
|
139
|
-
def push_info(self) -> Optional[pulumi.Input[
|
138
|
+
def push_info(self) -> Optional[pulumi.Input[_builtins.str]]:
|
140
139
|
"""
|
141
140
|
`(string)` - Push information for Duo.
|
142
141
|
"""
|
143
142
|
return pulumi.get(self, "push_info")
|
144
143
|
|
145
144
|
@push_info.setter
|
146
|
-
def push_info(self, value: Optional[pulumi.Input[
|
145
|
+
def push_info(self, value: Optional[pulumi.Input[_builtins.str]]):
|
147
146
|
pulumi.set(self, "push_info", value)
|
148
147
|
|
149
|
-
@property
|
148
|
+
@_builtins.property
|
150
149
|
@pulumi.getter(name="usernameFormat")
|
151
|
-
def username_format(self) -> Optional[pulumi.Input[
|
150
|
+
def username_format(self) -> Optional[pulumi.Input[_builtins.str]]:
|
152
151
|
"""
|
153
152
|
`(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
154
153
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
@@ -159,34 +158,34 @@ class MfaDuoArgs:
|
|
159
158
|
return pulumi.get(self, "username_format")
|
160
159
|
|
161
160
|
@username_format.setter
|
162
|
-
def username_format(self, value: Optional[pulumi.Input[
|
161
|
+
def username_format(self, value: Optional[pulumi.Input[_builtins.str]]):
|
163
162
|
pulumi.set(self, "username_format", value)
|
164
163
|
|
165
164
|
|
166
165
|
@pulumi.input_type
|
167
166
|
class _MfaDuoState:
|
168
167
|
def __init__(__self__, *,
|
169
|
-
api_hostname: Optional[pulumi.Input[
|
170
|
-
integration_key: Optional[pulumi.Input[
|
171
|
-
mount_accessor: Optional[pulumi.Input[
|
172
|
-
name: Optional[pulumi.Input[
|
173
|
-
namespace: Optional[pulumi.Input[
|
174
|
-
push_info: Optional[pulumi.Input[
|
175
|
-
secret_key: Optional[pulumi.Input[
|
176
|
-
username_format: Optional[pulumi.Input[
|
168
|
+
api_hostname: Optional[pulumi.Input[_builtins.str]] = None,
|
169
|
+
integration_key: Optional[pulumi.Input[_builtins.str]] = None,
|
170
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
171
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
172
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
173
|
+
push_info: Optional[pulumi.Input[_builtins.str]] = None,
|
174
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
175
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None):
|
177
176
|
"""
|
178
177
|
Input properties used for looking up and filtering MfaDuo resources.
|
179
|
-
:param pulumi.Input[
|
180
|
-
:param pulumi.Input[
|
181
|
-
:param pulumi.Input[
|
182
|
-
:param pulumi.Input[
|
183
|
-
:param pulumi.Input[
|
178
|
+
:param pulumi.Input[_builtins.str] api_hostname: `(string: <required>)` - API hostname for Duo.
|
179
|
+
:param pulumi.Input[_builtins.str] integration_key: `(string: <required>)` - Integration key for Duo.
|
180
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
181
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
182
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
184
183
|
The value should not contain leading or trailing forward slashes.
|
185
184
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
186
185
|
*Available only for Vault Enterprise*.
|
187
|
-
:param pulumi.Input[
|
188
|
-
:param pulumi.Input[
|
189
|
-
:param pulumi.Input[
|
186
|
+
:param pulumi.Input[_builtins.str] push_info: `(string)` - Push information for Duo.
|
187
|
+
:param pulumi.Input[_builtins.str] secret_key: `(string: <required>)` - Secret key for Duo.
|
188
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
190
189
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
191
190
|
- entity.name: The name configured for the Entity
|
192
191
|
- alias.metadata.`<key>`: The value of the Alias's metadata parameter
|
@@ -209,57 +208,57 @@ class _MfaDuoState:
|
|
209
208
|
if username_format is not None:
|
210
209
|
pulumi.set(__self__, "username_format", username_format)
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
@pulumi.getter(name="apiHostname")
|
214
|
-
def api_hostname(self) -> Optional[pulumi.Input[
|
213
|
+
def api_hostname(self) -> Optional[pulumi.Input[_builtins.str]]:
|
215
214
|
"""
|
216
215
|
`(string: <required>)` - API hostname for Duo.
|
217
216
|
"""
|
218
217
|
return pulumi.get(self, "api_hostname")
|
219
218
|
|
220
219
|
@api_hostname.setter
|
221
|
-
def api_hostname(self, value: Optional[pulumi.Input[
|
220
|
+
def api_hostname(self, value: Optional[pulumi.Input[_builtins.str]]):
|
222
221
|
pulumi.set(self, "api_hostname", value)
|
223
222
|
|
224
|
-
@property
|
223
|
+
@_builtins.property
|
225
224
|
@pulumi.getter(name="integrationKey")
|
226
|
-
def integration_key(self) -> Optional[pulumi.Input[
|
225
|
+
def integration_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
227
226
|
"""
|
228
227
|
`(string: <required>)` - Integration key for Duo.
|
229
228
|
"""
|
230
229
|
return pulumi.get(self, "integration_key")
|
231
230
|
|
232
231
|
@integration_key.setter
|
233
|
-
def integration_key(self, value: Optional[pulumi.Input[
|
232
|
+
def integration_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
234
233
|
pulumi.set(self, "integration_key", value)
|
235
234
|
|
236
|
-
@property
|
235
|
+
@_builtins.property
|
237
236
|
@pulumi.getter(name="mountAccessor")
|
238
|
-
def mount_accessor(self) -> Optional[pulumi.Input[
|
237
|
+
def mount_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
239
238
|
"""
|
240
239
|
`(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
241
240
|
"""
|
242
241
|
return pulumi.get(self, "mount_accessor")
|
243
242
|
|
244
243
|
@mount_accessor.setter
|
245
|
-
def mount_accessor(self, value: Optional[pulumi.Input[
|
244
|
+
def mount_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
246
245
|
pulumi.set(self, "mount_accessor", value)
|
247
246
|
|
248
|
-
@property
|
247
|
+
@_builtins.property
|
249
248
|
@pulumi.getter
|
250
|
-
def name(self) -> Optional[pulumi.Input[
|
249
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
251
250
|
"""
|
252
251
|
`(string: <required>)` – Name of the MFA method.
|
253
252
|
"""
|
254
253
|
return pulumi.get(self, "name")
|
255
254
|
|
256
255
|
@name.setter
|
257
|
-
def name(self, value: Optional[pulumi.Input[
|
256
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
258
257
|
pulumi.set(self, "name", value)
|
259
258
|
|
260
|
-
@property
|
259
|
+
@_builtins.property
|
261
260
|
@pulumi.getter
|
262
|
-
def namespace(self) -> Optional[pulumi.Input[
|
261
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
263
262
|
"""
|
264
263
|
The namespace to provision the resource in.
|
265
264
|
The value should not contain leading or trailing forward slashes.
|
@@ -269,36 +268,36 @@ class _MfaDuoState:
|
|
269
268
|
return pulumi.get(self, "namespace")
|
270
269
|
|
271
270
|
@namespace.setter
|
272
|
-
def namespace(self, value: Optional[pulumi.Input[
|
271
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
273
272
|
pulumi.set(self, "namespace", value)
|
274
273
|
|
275
|
-
@property
|
274
|
+
@_builtins.property
|
276
275
|
@pulumi.getter(name="pushInfo")
|
277
|
-
def push_info(self) -> Optional[pulumi.Input[
|
276
|
+
def push_info(self) -> Optional[pulumi.Input[_builtins.str]]:
|
278
277
|
"""
|
279
278
|
`(string)` - Push information for Duo.
|
280
279
|
"""
|
281
280
|
return pulumi.get(self, "push_info")
|
282
281
|
|
283
282
|
@push_info.setter
|
284
|
-
def push_info(self, value: Optional[pulumi.Input[
|
283
|
+
def push_info(self, value: Optional[pulumi.Input[_builtins.str]]):
|
285
284
|
pulumi.set(self, "push_info", value)
|
286
285
|
|
287
|
-
@property
|
286
|
+
@_builtins.property
|
288
287
|
@pulumi.getter(name="secretKey")
|
289
|
-
def secret_key(self) -> Optional[pulumi.Input[
|
288
|
+
def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
290
289
|
"""
|
291
290
|
`(string: <required>)` - Secret key for Duo.
|
292
291
|
"""
|
293
292
|
return pulumi.get(self, "secret_key")
|
294
293
|
|
295
294
|
@secret_key.setter
|
296
|
-
def secret_key(self, value: Optional[pulumi.Input[
|
295
|
+
def secret_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
297
296
|
pulumi.set(self, "secret_key", value)
|
298
297
|
|
299
|
-
@property
|
298
|
+
@_builtins.property
|
300
299
|
@pulumi.getter(name="usernameFormat")
|
301
|
-
def username_format(self) -> Optional[pulumi.Input[
|
300
|
+
def username_format(self) -> Optional[pulumi.Input[_builtins.str]]:
|
302
301
|
"""
|
303
302
|
`(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
304
303
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
@@ -309,7 +308,7 @@ class _MfaDuoState:
|
|
309
308
|
return pulumi.get(self, "username_format")
|
310
309
|
|
311
310
|
@username_format.setter
|
312
|
-
def username_format(self, value: Optional[pulumi.Input[
|
311
|
+
def username_format(self, value: Optional[pulumi.Input[_builtins.str]]):
|
313
312
|
pulumi.set(self, "username_format", value)
|
314
313
|
|
315
314
|
|
@@ -319,14 +318,14 @@ class MfaDuo(pulumi.CustomResource):
|
|
319
318
|
def __init__(__self__,
|
320
319
|
resource_name: str,
|
321
320
|
opts: Optional[pulumi.ResourceOptions] = None,
|
322
|
-
api_hostname: Optional[pulumi.Input[
|
323
|
-
integration_key: Optional[pulumi.Input[
|
324
|
-
mount_accessor: Optional[pulumi.Input[
|
325
|
-
name: Optional[pulumi.Input[
|
326
|
-
namespace: Optional[pulumi.Input[
|
327
|
-
push_info: Optional[pulumi.Input[
|
328
|
-
secret_key: Optional[pulumi.Input[
|
329
|
-
username_format: Optional[pulumi.Input[
|
321
|
+
api_hostname: Optional[pulumi.Input[_builtins.str]] = None,
|
322
|
+
integration_key: Optional[pulumi.Input[_builtins.str]] = None,
|
323
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
324
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
325
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
326
|
+
push_info: Optional[pulumi.Input[_builtins.str]] = None,
|
327
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
328
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None,
|
330
329
|
__props__=None):
|
331
330
|
"""
|
332
331
|
Provides a resource to manage [Duo MFA](https://www.vaultproject.io/docs/enterprise/mfa/mfa-duo.html).
|
@@ -360,17 +359,17 @@ class MfaDuo(pulumi.CustomResource):
|
|
360
359
|
|
361
360
|
:param str resource_name: The name of the resource.
|
362
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
363
|
-
:param pulumi.Input[
|
364
|
-
:param pulumi.Input[
|
365
|
-
:param pulumi.Input[
|
366
|
-
:param pulumi.Input[
|
367
|
-
:param pulumi.Input[
|
362
|
+
:param pulumi.Input[_builtins.str] api_hostname: `(string: <required>)` - API hostname for Duo.
|
363
|
+
:param pulumi.Input[_builtins.str] integration_key: `(string: <required>)` - Integration key for Duo.
|
364
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
365
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
366
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
368
367
|
The value should not contain leading or trailing forward slashes.
|
369
368
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
370
369
|
*Available only for Vault Enterprise*.
|
371
|
-
:param pulumi.Input[
|
372
|
-
:param pulumi.Input[
|
373
|
-
:param pulumi.Input[
|
370
|
+
:param pulumi.Input[_builtins.str] push_info: `(string)` - Push information for Duo.
|
371
|
+
:param pulumi.Input[_builtins.str] secret_key: `(string: <required>)` - Secret key for Duo.
|
372
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
374
373
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
375
374
|
- entity.name: The name configured for the Entity
|
376
375
|
- alias.metadata.`<key>`: The value of the Alias's metadata parameter
|
@@ -427,14 +426,14 @@ class MfaDuo(pulumi.CustomResource):
|
|
427
426
|
def _internal_init(__self__,
|
428
427
|
resource_name: str,
|
429
428
|
opts: Optional[pulumi.ResourceOptions] = None,
|
430
|
-
api_hostname: Optional[pulumi.Input[
|
431
|
-
integration_key: Optional[pulumi.Input[
|
432
|
-
mount_accessor: Optional[pulumi.Input[
|
433
|
-
name: Optional[pulumi.Input[
|
434
|
-
namespace: Optional[pulumi.Input[
|
435
|
-
push_info: Optional[pulumi.Input[
|
436
|
-
secret_key: Optional[pulumi.Input[
|
437
|
-
username_format: Optional[pulumi.Input[
|
429
|
+
api_hostname: Optional[pulumi.Input[_builtins.str]] = None,
|
430
|
+
integration_key: Optional[pulumi.Input[_builtins.str]] = None,
|
431
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
432
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
433
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
434
|
+
push_info: Optional[pulumi.Input[_builtins.str]] = None,
|
435
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
436
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None,
|
438
437
|
__props__=None):
|
439
438
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
440
439
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -472,14 +471,14 @@ class MfaDuo(pulumi.CustomResource):
|
|
472
471
|
def get(resource_name: str,
|
473
472
|
id: pulumi.Input[str],
|
474
473
|
opts: Optional[pulumi.ResourceOptions] = None,
|
475
|
-
api_hostname: Optional[pulumi.Input[
|
476
|
-
integration_key: Optional[pulumi.Input[
|
477
|
-
mount_accessor: Optional[pulumi.Input[
|
478
|
-
name: Optional[pulumi.Input[
|
479
|
-
namespace: Optional[pulumi.Input[
|
480
|
-
push_info: Optional[pulumi.Input[
|
481
|
-
secret_key: Optional[pulumi.Input[
|
482
|
-
username_format: Optional[pulumi.Input[
|
474
|
+
api_hostname: Optional[pulumi.Input[_builtins.str]] = None,
|
475
|
+
integration_key: Optional[pulumi.Input[_builtins.str]] = None,
|
476
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
477
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
478
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
479
|
+
push_info: Optional[pulumi.Input[_builtins.str]] = None,
|
480
|
+
secret_key: Optional[pulumi.Input[_builtins.str]] = None,
|
481
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None) -> 'MfaDuo':
|
483
482
|
"""
|
484
483
|
Get an existing MfaDuo resource's state with the given name, id, and optional extra
|
485
484
|
properties used to qualify the lookup.
|
@@ -487,17 +486,17 @@ class MfaDuo(pulumi.CustomResource):
|
|
487
486
|
:param str resource_name: The unique name of the resulting resource.
|
488
487
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
489
488
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
490
|
-
:param pulumi.Input[
|
491
|
-
:param pulumi.Input[
|
492
|
-
:param pulumi.Input[
|
493
|
-
:param pulumi.Input[
|
494
|
-
:param pulumi.Input[
|
489
|
+
:param pulumi.Input[_builtins.str] api_hostname: `(string: <required>)` - API hostname for Duo.
|
490
|
+
:param pulumi.Input[_builtins.str] integration_key: `(string: <required>)` - Integration key for Duo.
|
491
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
492
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
493
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
495
494
|
The value should not contain leading or trailing forward slashes.
|
496
495
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
497
496
|
*Available only for Vault Enterprise*.
|
498
|
-
:param pulumi.Input[
|
499
|
-
:param pulumi.Input[
|
500
|
-
:param pulumi.Input[
|
497
|
+
:param pulumi.Input[_builtins.str] push_info: `(string)` - Push information for Duo.
|
498
|
+
:param pulumi.Input[_builtins.str] secret_key: `(string: <required>)` - Secret key for Duo.
|
499
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
501
500
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
502
501
|
- entity.name: The name configured for the Entity
|
503
502
|
- alias.metadata.`<key>`: The value of the Alias's metadata parameter
|
@@ -517,41 +516,41 @@ class MfaDuo(pulumi.CustomResource):
|
|
517
516
|
__props__.__dict__["username_format"] = username_format
|
518
517
|
return MfaDuo(resource_name, opts=opts, __props__=__props__)
|
519
518
|
|
520
|
-
@property
|
519
|
+
@_builtins.property
|
521
520
|
@pulumi.getter(name="apiHostname")
|
522
|
-
def api_hostname(self) -> pulumi.Output[
|
521
|
+
def api_hostname(self) -> pulumi.Output[_builtins.str]:
|
523
522
|
"""
|
524
523
|
`(string: <required>)` - API hostname for Duo.
|
525
524
|
"""
|
526
525
|
return pulumi.get(self, "api_hostname")
|
527
526
|
|
528
|
-
@property
|
527
|
+
@_builtins.property
|
529
528
|
@pulumi.getter(name="integrationKey")
|
530
|
-
def integration_key(self) -> pulumi.Output[
|
529
|
+
def integration_key(self) -> pulumi.Output[_builtins.str]:
|
531
530
|
"""
|
532
531
|
`(string: <required>)` - Integration key for Duo.
|
533
532
|
"""
|
534
533
|
return pulumi.get(self, "integration_key")
|
535
534
|
|
536
|
-
@property
|
535
|
+
@_builtins.property
|
537
536
|
@pulumi.getter(name="mountAccessor")
|
538
|
-
def mount_accessor(self) -> pulumi.Output[
|
537
|
+
def mount_accessor(self) -> pulumi.Output[_builtins.str]:
|
539
538
|
"""
|
540
539
|
`(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
541
540
|
"""
|
542
541
|
return pulumi.get(self, "mount_accessor")
|
543
542
|
|
544
|
-
@property
|
543
|
+
@_builtins.property
|
545
544
|
@pulumi.getter
|
546
|
-
def name(self) -> pulumi.Output[
|
545
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
547
546
|
"""
|
548
547
|
`(string: <required>)` – Name of the MFA method.
|
549
548
|
"""
|
550
549
|
return pulumi.get(self, "name")
|
551
550
|
|
552
|
-
@property
|
551
|
+
@_builtins.property
|
553
552
|
@pulumi.getter
|
554
|
-
def namespace(self) -> pulumi.Output[Optional[
|
553
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
555
554
|
"""
|
556
555
|
The namespace to provision the resource in.
|
557
556
|
The value should not contain leading or trailing forward slashes.
|
@@ -560,25 +559,25 @@ class MfaDuo(pulumi.CustomResource):
|
|
560
559
|
"""
|
561
560
|
return pulumi.get(self, "namespace")
|
562
561
|
|
563
|
-
@property
|
562
|
+
@_builtins.property
|
564
563
|
@pulumi.getter(name="pushInfo")
|
565
|
-
def push_info(self) -> pulumi.Output[Optional[
|
564
|
+
def push_info(self) -> pulumi.Output[Optional[_builtins.str]]:
|
566
565
|
"""
|
567
566
|
`(string)` - Push information for Duo.
|
568
567
|
"""
|
569
568
|
return pulumi.get(self, "push_info")
|
570
569
|
|
571
|
-
@property
|
570
|
+
@_builtins.property
|
572
571
|
@pulumi.getter(name="secretKey")
|
573
|
-
def secret_key(self) -> pulumi.Output[
|
572
|
+
def secret_key(self) -> pulumi.Output[_builtins.str]:
|
574
573
|
"""
|
575
574
|
`(string: <required>)` - Secret key for Duo.
|
576
575
|
"""
|
577
576
|
return pulumi.get(self, "secret_key")
|
578
577
|
|
579
|
-
@property
|
578
|
+
@_builtins.property
|
580
579
|
@pulumi.getter(name="usernameFormat")
|
581
|
-
def username_format(self) -> pulumi.Output[Optional[
|
580
|
+
def username_format(self) -> pulumi.Output[Optional[_builtins.str]]:
|
582
581
|
"""
|
583
582
|
`(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
584
583
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|