pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_pingid.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,23 +19,23 @@ __all__ = ['MfaPingidArgs', 'MfaPingid']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class MfaPingidArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
mount_accessor: pulumi.Input[
|
24
|
-
settings_file_base64: pulumi.Input[
|
25
|
-
name: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
username_format: Optional[pulumi.Input[
|
22
|
+
mount_accessor: pulumi.Input[_builtins.str],
|
23
|
+
settings_file_base64: pulumi.Input[_builtins.str],
|
24
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a MfaPingid resource.
|
30
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
|
31
30
|
The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
|
33
32
|
from PingID's configuration page.
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
34
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
36
35
|
The value should not contain leading or trailing forward slashes.
|
37
36
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
37
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
|
40
39
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
41
40
|
If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
42
41
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
@@ -53,9 +52,9 @@ class MfaPingidArgs:
|
|
53
52
|
if username_format is not None:
|
54
53
|
pulumi.set(__self__, "username_format", username_format)
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter(name="mountAccessor")
|
58
|
-
def mount_accessor(self) -> pulumi.Input[
|
57
|
+
def mount_accessor(self) -> pulumi.Input[_builtins.str]:
|
59
58
|
"""
|
60
59
|
`(string: <required>)` - The mount to tie this method to for use in automatic mappings.
|
61
60
|
The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
@@ -63,12 +62,12 @@ class MfaPingidArgs:
|
|
63
62
|
return pulumi.get(self, "mount_accessor")
|
64
63
|
|
65
64
|
@mount_accessor.setter
|
66
|
-
def mount_accessor(self, value: pulumi.Input[
|
65
|
+
def mount_accessor(self, value: pulumi.Input[_builtins.str]):
|
67
66
|
pulumi.set(self, "mount_accessor", value)
|
68
67
|
|
69
|
-
@property
|
68
|
+
@_builtins.property
|
70
69
|
@pulumi.getter(name="settingsFileBase64")
|
71
|
-
def settings_file_base64(self) -> pulumi.Input[
|
70
|
+
def settings_file_base64(self) -> pulumi.Input[_builtins.str]:
|
72
71
|
"""
|
73
72
|
`(string: <required>)` - A base64-encoded third-party settings file retrieved
|
74
73
|
from PingID's configuration page.
|
@@ -76,24 +75,24 @@ class MfaPingidArgs:
|
|
76
75
|
return pulumi.get(self, "settings_file_base64")
|
77
76
|
|
78
77
|
@settings_file_base64.setter
|
79
|
-
def settings_file_base64(self, value: pulumi.Input[
|
78
|
+
def settings_file_base64(self, value: pulumi.Input[_builtins.str]):
|
80
79
|
pulumi.set(self, "settings_file_base64", value)
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter
|
84
|
-
def name(self) -> Optional[pulumi.Input[
|
83
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
85
84
|
"""
|
86
85
|
`(string: <required>)` – Name of the MFA method.
|
87
86
|
"""
|
88
87
|
return pulumi.get(self, "name")
|
89
88
|
|
90
89
|
@name.setter
|
91
|
-
def name(self, value: Optional[pulumi.Input[
|
90
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
92
91
|
pulumi.set(self, "name", value)
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter
|
96
|
-
def namespace(self) -> Optional[pulumi.Input[
|
95
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
97
96
|
"""
|
98
97
|
The namespace to provision the resource in.
|
99
98
|
The value should not contain leading or trailing forward slashes.
|
@@ -103,12 +102,12 @@ class MfaPingidArgs:
|
|
103
102
|
return pulumi.get(self, "namespace")
|
104
103
|
|
105
104
|
@namespace.setter
|
106
|
-
def namespace(self, value: Optional[pulumi.Input[
|
105
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
107
106
|
pulumi.set(self, "namespace", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter(name="usernameFormat")
|
111
|
-
def username_format(self) -> Optional[pulumi.Input[
|
110
|
+
def username_format(self) -> Optional[pulumi.Input[_builtins.str]]:
|
112
111
|
"""
|
113
112
|
`(string)` - A format string for mapping Identity names to MFA method names.
|
114
113
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
@@ -121,44 +120,44 @@ class MfaPingidArgs:
|
|
121
120
|
return pulumi.get(self, "username_format")
|
122
121
|
|
123
122
|
@username_format.setter
|
124
|
-
def username_format(self, value: Optional[pulumi.Input[
|
123
|
+
def username_format(self, value: Optional[pulumi.Input[_builtins.str]]):
|
125
124
|
pulumi.set(self, "username_format", value)
|
126
125
|
|
127
126
|
|
128
127
|
@pulumi.input_type
|
129
128
|
class _MfaPingidState:
|
130
129
|
def __init__(__self__, *,
|
131
|
-
admin_url: Optional[pulumi.Input[
|
132
|
-
authenticator_url: Optional[pulumi.Input[
|
133
|
-
idp_url: Optional[pulumi.Input[
|
134
|
-
mount_accessor: Optional[pulumi.Input[
|
135
|
-
name: Optional[pulumi.Input[
|
136
|
-
namespace: Optional[pulumi.Input[
|
137
|
-
namespace_id: Optional[pulumi.Input[
|
138
|
-
org_alias: Optional[pulumi.Input[
|
139
|
-
settings_file_base64: Optional[pulumi.Input[
|
140
|
-
type: Optional[pulumi.Input[
|
141
|
-
use_signature: Optional[pulumi.Input[
|
142
|
-
username_format: Optional[pulumi.Input[
|
130
|
+
admin_url: Optional[pulumi.Input[_builtins.str]] = None,
|
131
|
+
authenticator_url: Optional[pulumi.Input[_builtins.str]] = None,
|
132
|
+
idp_url: Optional[pulumi.Input[_builtins.str]] = None,
|
133
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
134
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
135
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
136
|
+
namespace_id: Optional[pulumi.Input[_builtins.str]] = None,
|
137
|
+
org_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
138
|
+
settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
|
139
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
140
|
+
use_signature: Optional[pulumi.Input[_builtins.bool]] = None,
|
141
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None):
|
143
142
|
"""
|
144
143
|
Input properties used for looking up and filtering MfaPingid resources.
|
145
|
-
:param pulumi.Input[
|
146
|
-
:param pulumi.Input[
|
147
|
-
:param pulumi.Input[
|
148
|
-
:param pulumi.Input[
|
144
|
+
:param pulumi.Input[_builtins.str] admin_url: `(string)` – Admin URL computed by Vault
|
145
|
+
:param pulumi.Input[_builtins.str] authenticator_url: `(string)` – Authenticator URL computed by Vault
|
146
|
+
:param pulumi.Input[_builtins.str] idp_url: `(string)` – IDP URL computed by Vault
|
147
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
|
149
148
|
The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
150
|
-
:param pulumi.Input[
|
151
|
-
:param pulumi.Input[
|
149
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
150
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
152
151
|
The value should not contain leading or trailing forward slashes.
|
153
152
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
154
153
|
*Available only for Vault Enterprise*.
|
155
|
-
:param pulumi.Input[
|
156
|
-
:param pulumi.Input[
|
157
|
-
:param pulumi.Input[
|
154
|
+
:param pulumi.Input[_builtins.str] namespace_id: `(string)` – Namespace ID computed by Vault
|
155
|
+
:param pulumi.Input[_builtins.str] org_alias: `(string)` – Org Alias computed by Vault
|
156
|
+
:param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
|
158
157
|
from PingID's configuration page.
|
159
|
-
:param pulumi.Input[
|
160
|
-
:param pulumi.Input[
|
161
|
-
:param pulumi.Input[
|
158
|
+
:param pulumi.Input[_builtins.str] type: `(string)` – Type of configuration computed by Vault
|
159
|
+
:param pulumi.Input[_builtins.bool] use_signature: `(string)` – If set to true, enables use of PingID signature. Computed by Vault
|
160
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
|
162
161
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
163
162
|
If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
164
163
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
@@ -191,45 +190,45 @@ class _MfaPingidState:
|
|
191
190
|
if username_format is not None:
|
192
191
|
pulumi.set(__self__, "username_format", username_format)
|
193
192
|
|
194
|
-
@property
|
193
|
+
@_builtins.property
|
195
194
|
@pulumi.getter(name="adminUrl")
|
196
|
-
def admin_url(self) -> Optional[pulumi.Input[
|
195
|
+
def admin_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
197
196
|
"""
|
198
197
|
`(string)` – Admin URL computed by Vault
|
199
198
|
"""
|
200
199
|
return pulumi.get(self, "admin_url")
|
201
200
|
|
202
201
|
@admin_url.setter
|
203
|
-
def admin_url(self, value: Optional[pulumi.Input[
|
202
|
+
def admin_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
204
203
|
pulumi.set(self, "admin_url", value)
|
205
204
|
|
206
|
-
@property
|
205
|
+
@_builtins.property
|
207
206
|
@pulumi.getter(name="authenticatorUrl")
|
208
|
-
def authenticator_url(self) -> Optional[pulumi.Input[
|
207
|
+
def authenticator_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
209
208
|
"""
|
210
209
|
`(string)` – Authenticator URL computed by Vault
|
211
210
|
"""
|
212
211
|
return pulumi.get(self, "authenticator_url")
|
213
212
|
|
214
213
|
@authenticator_url.setter
|
215
|
-
def authenticator_url(self, value: Optional[pulumi.Input[
|
214
|
+
def authenticator_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
216
215
|
pulumi.set(self, "authenticator_url", value)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter(name="idpUrl")
|
220
|
-
def idp_url(self) -> Optional[pulumi.Input[
|
219
|
+
def idp_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
221
220
|
"""
|
222
221
|
`(string)` – IDP URL computed by Vault
|
223
222
|
"""
|
224
223
|
return pulumi.get(self, "idp_url")
|
225
224
|
|
226
225
|
@idp_url.setter
|
227
|
-
def idp_url(self, value: Optional[pulumi.Input[
|
226
|
+
def idp_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
228
227
|
pulumi.set(self, "idp_url", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter(name="mountAccessor")
|
232
|
-
def mount_accessor(self) -> Optional[pulumi.Input[
|
231
|
+
def mount_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
233
232
|
"""
|
234
233
|
`(string: <required>)` - The mount to tie this method to for use in automatic mappings.
|
235
234
|
The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
@@ -237,24 +236,24 @@ class _MfaPingidState:
|
|
237
236
|
return pulumi.get(self, "mount_accessor")
|
238
237
|
|
239
238
|
@mount_accessor.setter
|
240
|
-
def mount_accessor(self, value: Optional[pulumi.Input[
|
239
|
+
def mount_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
241
240
|
pulumi.set(self, "mount_accessor", value)
|
242
241
|
|
243
|
-
@property
|
242
|
+
@_builtins.property
|
244
243
|
@pulumi.getter
|
245
|
-
def name(self) -> Optional[pulumi.Input[
|
244
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
246
245
|
"""
|
247
246
|
`(string: <required>)` – Name of the MFA method.
|
248
247
|
"""
|
249
248
|
return pulumi.get(self, "name")
|
250
249
|
|
251
250
|
@name.setter
|
252
|
-
def name(self, value: Optional[pulumi.Input[
|
251
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
253
252
|
pulumi.set(self, "name", value)
|
254
253
|
|
255
|
-
@property
|
254
|
+
@_builtins.property
|
256
255
|
@pulumi.getter
|
257
|
-
def namespace(self) -> Optional[pulumi.Input[
|
256
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
258
257
|
"""
|
259
258
|
The namespace to provision the resource in.
|
260
259
|
The value should not contain leading or trailing forward slashes.
|
@@ -264,36 +263,36 @@ class _MfaPingidState:
|
|
264
263
|
return pulumi.get(self, "namespace")
|
265
264
|
|
266
265
|
@namespace.setter
|
267
|
-
def namespace(self, value: Optional[pulumi.Input[
|
266
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
268
267
|
pulumi.set(self, "namespace", value)
|
269
268
|
|
270
|
-
@property
|
269
|
+
@_builtins.property
|
271
270
|
@pulumi.getter(name="namespaceId")
|
272
|
-
def namespace_id(self) -> Optional[pulumi.Input[
|
271
|
+
def namespace_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
273
272
|
"""
|
274
273
|
`(string)` – Namespace ID computed by Vault
|
275
274
|
"""
|
276
275
|
return pulumi.get(self, "namespace_id")
|
277
276
|
|
278
277
|
@namespace_id.setter
|
279
|
-
def namespace_id(self, value: Optional[pulumi.Input[
|
278
|
+
def namespace_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
280
279
|
pulumi.set(self, "namespace_id", value)
|
281
280
|
|
282
|
-
@property
|
281
|
+
@_builtins.property
|
283
282
|
@pulumi.getter(name="orgAlias")
|
284
|
-
def org_alias(self) -> Optional[pulumi.Input[
|
283
|
+
def org_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
|
285
284
|
"""
|
286
285
|
`(string)` – Org Alias computed by Vault
|
287
286
|
"""
|
288
287
|
return pulumi.get(self, "org_alias")
|
289
288
|
|
290
289
|
@org_alias.setter
|
291
|
-
def org_alias(self, value: Optional[pulumi.Input[
|
290
|
+
def org_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
|
292
291
|
pulumi.set(self, "org_alias", value)
|
293
292
|
|
294
|
-
@property
|
293
|
+
@_builtins.property
|
295
294
|
@pulumi.getter(name="settingsFileBase64")
|
296
|
-
def settings_file_base64(self) -> Optional[pulumi.Input[
|
295
|
+
def settings_file_base64(self) -> Optional[pulumi.Input[_builtins.str]]:
|
297
296
|
"""
|
298
297
|
`(string: <required>)` - A base64-encoded third-party settings file retrieved
|
299
298
|
from PingID's configuration page.
|
@@ -301,36 +300,36 @@ class _MfaPingidState:
|
|
301
300
|
return pulumi.get(self, "settings_file_base64")
|
302
301
|
|
303
302
|
@settings_file_base64.setter
|
304
|
-
def settings_file_base64(self, value: Optional[pulumi.Input[
|
303
|
+
def settings_file_base64(self, value: Optional[pulumi.Input[_builtins.str]]):
|
305
304
|
pulumi.set(self, "settings_file_base64", value)
|
306
305
|
|
307
|
-
@property
|
306
|
+
@_builtins.property
|
308
307
|
@pulumi.getter
|
309
|
-
def type(self) -> Optional[pulumi.Input[
|
308
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
310
309
|
"""
|
311
310
|
`(string)` – Type of configuration computed by Vault
|
312
311
|
"""
|
313
312
|
return pulumi.get(self, "type")
|
314
313
|
|
315
314
|
@type.setter
|
316
|
-
def type(self, value: Optional[pulumi.Input[
|
315
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
317
316
|
pulumi.set(self, "type", value)
|
318
317
|
|
319
|
-
@property
|
318
|
+
@_builtins.property
|
320
319
|
@pulumi.getter(name="useSignature")
|
321
|
-
def use_signature(self) -> Optional[pulumi.Input[
|
320
|
+
def use_signature(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
322
321
|
"""
|
323
322
|
`(string)` – If set to true, enables use of PingID signature. Computed by Vault
|
324
323
|
"""
|
325
324
|
return pulumi.get(self, "use_signature")
|
326
325
|
|
327
326
|
@use_signature.setter
|
328
|
-
def use_signature(self, value: Optional[pulumi.Input[
|
327
|
+
def use_signature(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
329
328
|
pulumi.set(self, "use_signature", value)
|
330
329
|
|
331
|
-
@property
|
330
|
+
@_builtins.property
|
332
331
|
@pulumi.getter(name="usernameFormat")
|
333
|
-
def username_format(self) -> Optional[pulumi.Input[
|
332
|
+
def username_format(self) -> Optional[pulumi.Input[_builtins.str]]:
|
334
333
|
"""
|
335
334
|
`(string)` - A format string for mapping Identity names to MFA method names.
|
336
335
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
@@ -343,7 +342,7 @@ class _MfaPingidState:
|
|
343
342
|
return pulumi.get(self, "username_format")
|
344
343
|
|
345
344
|
@username_format.setter
|
346
|
-
def username_format(self, value: Optional[pulumi.Input[
|
345
|
+
def username_format(self, value: Optional[pulumi.Input[_builtins.str]]):
|
347
346
|
pulumi.set(self, "username_format", value)
|
348
347
|
|
349
348
|
|
@@ -353,11 +352,11 @@ class MfaPingid(pulumi.CustomResource):
|
|
353
352
|
def __init__(__self__,
|
354
353
|
resource_name: str,
|
355
354
|
opts: Optional[pulumi.ResourceOptions] = None,
|
356
|
-
mount_accessor: Optional[pulumi.Input[
|
357
|
-
name: Optional[pulumi.Input[
|
358
|
-
namespace: Optional[pulumi.Input[
|
359
|
-
settings_file_base64: Optional[pulumi.Input[
|
360
|
-
username_format: Optional[pulumi.Input[
|
355
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
356
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
357
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
358
|
+
settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
|
359
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None,
|
361
360
|
__props__=None):
|
362
361
|
"""
|
363
362
|
Provides a resource to manage [PingID MFA](https://www.vaultproject.io/docs/enterprise/mfa/mfa-pingid).
|
@@ -392,16 +391,16 @@ class MfaPingid(pulumi.CustomResource):
|
|
392
391
|
|
393
392
|
:param str resource_name: The name of the resource.
|
394
393
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
395
|
-
:param pulumi.Input[
|
394
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
|
396
395
|
The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
397
|
-
:param pulumi.Input[
|
398
|
-
:param pulumi.Input[
|
396
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
397
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
399
398
|
The value should not contain leading or trailing forward slashes.
|
400
399
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
401
400
|
*Available only for Vault Enterprise*.
|
402
|
-
:param pulumi.Input[
|
401
|
+
:param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
|
403
402
|
from PingID's configuration page.
|
404
|
-
:param pulumi.Input[
|
403
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
|
405
404
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
406
405
|
If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
407
406
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
@@ -461,11 +460,11 @@ class MfaPingid(pulumi.CustomResource):
|
|
461
460
|
def _internal_init(__self__,
|
462
461
|
resource_name: str,
|
463
462
|
opts: Optional[pulumi.ResourceOptions] = None,
|
464
|
-
mount_accessor: Optional[pulumi.Input[
|
465
|
-
name: Optional[pulumi.Input[
|
466
|
-
namespace: Optional[pulumi.Input[
|
467
|
-
settings_file_base64: Optional[pulumi.Input[
|
468
|
-
username_format: Optional[pulumi.Input[
|
463
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
464
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
465
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
466
|
+
settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
|
467
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None,
|
469
468
|
__props__=None):
|
470
469
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
471
470
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -501,18 +500,18 @@ class MfaPingid(pulumi.CustomResource):
|
|
501
500
|
def get(resource_name: str,
|
502
501
|
id: pulumi.Input[str],
|
503
502
|
opts: Optional[pulumi.ResourceOptions] = None,
|
504
|
-
admin_url: Optional[pulumi.Input[
|
505
|
-
authenticator_url: Optional[pulumi.Input[
|
506
|
-
idp_url: Optional[pulumi.Input[
|
507
|
-
mount_accessor: Optional[pulumi.Input[
|
508
|
-
name: Optional[pulumi.Input[
|
509
|
-
namespace: Optional[pulumi.Input[
|
510
|
-
namespace_id: Optional[pulumi.Input[
|
511
|
-
org_alias: Optional[pulumi.Input[
|
512
|
-
settings_file_base64: Optional[pulumi.Input[
|
513
|
-
type: Optional[pulumi.Input[
|
514
|
-
use_signature: Optional[pulumi.Input[
|
515
|
-
username_format: Optional[pulumi.Input[
|
503
|
+
admin_url: Optional[pulumi.Input[_builtins.str]] = None,
|
504
|
+
authenticator_url: Optional[pulumi.Input[_builtins.str]] = None,
|
505
|
+
idp_url: Optional[pulumi.Input[_builtins.str]] = None,
|
506
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
507
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
508
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
509
|
+
namespace_id: Optional[pulumi.Input[_builtins.str]] = None,
|
510
|
+
org_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
511
|
+
settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
|
512
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
513
|
+
use_signature: Optional[pulumi.Input[_builtins.bool]] = None,
|
514
|
+
username_format: Optional[pulumi.Input[_builtins.str]] = None) -> 'MfaPingid':
|
516
515
|
"""
|
517
516
|
Get an existing MfaPingid resource's state with the given name, id, and optional extra
|
518
517
|
properties used to qualify the lookup.
|
@@ -520,23 +519,23 @@ class MfaPingid(pulumi.CustomResource):
|
|
520
519
|
:param str resource_name: The unique name of the resulting resource.
|
521
520
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
522
521
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
523
|
-
:param pulumi.Input[
|
524
|
-
:param pulumi.Input[
|
525
|
-
:param pulumi.Input[
|
526
|
-
:param pulumi.Input[
|
522
|
+
:param pulumi.Input[_builtins.str] admin_url: `(string)` – Admin URL computed by Vault
|
523
|
+
:param pulumi.Input[_builtins.str] authenticator_url: `(string)` – Authenticator URL computed by Vault
|
524
|
+
:param pulumi.Input[_builtins.str] idp_url: `(string)` – IDP URL computed by Vault
|
525
|
+
:param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
|
527
526
|
The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
528
|
-
:param pulumi.Input[
|
529
|
-
:param pulumi.Input[
|
527
|
+
:param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
|
528
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
530
529
|
The value should not contain leading or trailing forward slashes.
|
531
530
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
532
531
|
*Available only for Vault Enterprise*.
|
533
|
-
:param pulumi.Input[
|
534
|
-
:param pulumi.Input[
|
535
|
-
:param pulumi.Input[
|
532
|
+
:param pulumi.Input[_builtins.str] namespace_id: `(string)` – Namespace ID computed by Vault
|
533
|
+
:param pulumi.Input[_builtins.str] org_alias: `(string)` – Org Alias computed by Vault
|
534
|
+
:param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
|
536
535
|
from PingID's configuration page.
|
537
|
-
:param pulumi.Input[
|
538
|
-
:param pulumi.Input[
|
539
|
-
:param pulumi.Input[
|
536
|
+
:param pulumi.Input[_builtins.str] type: `(string)` – Type of configuration computed by Vault
|
537
|
+
:param pulumi.Input[_builtins.bool] use_signature: `(string)` – If set to true, enables use of PingID signature. Computed by Vault
|
538
|
+
:param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
|
540
539
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
541
540
|
If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
|
542
541
|
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
|
@@ -562,50 +561,50 @@ class MfaPingid(pulumi.CustomResource):
|
|
562
561
|
__props__.__dict__["username_format"] = username_format
|
563
562
|
return MfaPingid(resource_name, opts=opts, __props__=__props__)
|
564
563
|
|
565
|
-
@property
|
564
|
+
@_builtins.property
|
566
565
|
@pulumi.getter(name="adminUrl")
|
567
|
-
def admin_url(self) -> pulumi.Output[
|
566
|
+
def admin_url(self) -> pulumi.Output[_builtins.str]:
|
568
567
|
"""
|
569
568
|
`(string)` – Admin URL computed by Vault
|
570
569
|
"""
|
571
570
|
return pulumi.get(self, "admin_url")
|
572
571
|
|
573
|
-
@property
|
572
|
+
@_builtins.property
|
574
573
|
@pulumi.getter(name="authenticatorUrl")
|
575
|
-
def authenticator_url(self) -> pulumi.Output[
|
574
|
+
def authenticator_url(self) -> pulumi.Output[_builtins.str]:
|
576
575
|
"""
|
577
576
|
`(string)` – Authenticator URL computed by Vault
|
578
577
|
"""
|
579
578
|
return pulumi.get(self, "authenticator_url")
|
580
579
|
|
581
|
-
@property
|
580
|
+
@_builtins.property
|
582
581
|
@pulumi.getter(name="idpUrl")
|
583
|
-
def idp_url(self) -> pulumi.Output[
|
582
|
+
def idp_url(self) -> pulumi.Output[_builtins.str]:
|
584
583
|
"""
|
585
584
|
`(string)` – IDP URL computed by Vault
|
586
585
|
"""
|
587
586
|
return pulumi.get(self, "idp_url")
|
588
587
|
|
589
|
-
@property
|
588
|
+
@_builtins.property
|
590
589
|
@pulumi.getter(name="mountAccessor")
|
591
|
-
def mount_accessor(self) -> pulumi.Output[
|
590
|
+
def mount_accessor(self) -> pulumi.Output[_builtins.str]:
|
592
591
|
"""
|
593
592
|
`(string: <required>)` - The mount to tie this method to for use in automatic mappings.
|
594
593
|
The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
|
595
594
|
"""
|
596
595
|
return pulumi.get(self, "mount_accessor")
|
597
596
|
|
598
|
-
@property
|
597
|
+
@_builtins.property
|
599
598
|
@pulumi.getter
|
600
|
-
def name(self) -> pulumi.Output[
|
599
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
601
600
|
"""
|
602
601
|
`(string: <required>)` – Name of the MFA method.
|
603
602
|
"""
|
604
603
|
return pulumi.get(self, "name")
|
605
604
|
|
606
|
-
@property
|
605
|
+
@_builtins.property
|
607
606
|
@pulumi.getter
|
608
|
-
def namespace(self) -> pulumi.Output[Optional[
|
607
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
609
608
|
"""
|
610
609
|
The namespace to provision the resource in.
|
611
610
|
The value should not contain leading or trailing forward slashes.
|
@@ -614,50 +613,50 @@ class MfaPingid(pulumi.CustomResource):
|
|
614
613
|
"""
|
615
614
|
return pulumi.get(self, "namespace")
|
616
615
|
|
617
|
-
@property
|
616
|
+
@_builtins.property
|
618
617
|
@pulumi.getter(name="namespaceId")
|
619
|
-
def namespace_id(self) -> pulumi.Output[
|
618
|
+
def namespace_id(self) -> pulumi.Output[_builtins.str]:
|
620
619
|
"""
|
621
620
|
`(string)` – Namespace ID computed by Vault
|
622
621
|
"""
|
623
622
|
return pulumi.get(self, "namespace_id")
|
624
623
|
|
625
|
-
@property
|
624
|
+
@_builtins.property
|
626
625
|
@pulumi.getter(name="orgAlias")
|
627
|
-
def org_alias(self) -> pulumi.Output[
|
626
|
+
def org_alias(self) -> pulumi.Output[_builtins.str]:
|
628
627
|
"""
|
629
628
|
`(string)` – Org Alias computed by Vault
|
630
629
|
"""
|
631
630
|
return pulumi.get(self, "org_alias")
|
632
631
|
|
633
|
-
@property
|
632
|
+
@_builtins.property
|
634
633
|
@pulumi.getter(name="settingsFileBase64")
|
635
|
-
def settings_file_base64(self) -> pulumi.Output[
|
634
|
+
def settings_file_base64(self) -> pulumi.Output[_builtins.str]:
|
636
635
|
"""
|
637
636
|
`(string: <required>)` - A base64-encoded third-party settings file retrieved
|
638
637
|
from PingID's configuration page.
|
639
638
|
"""
|
640
639
|
return pulumi.get(self, "settings_file_base64")
|
641
640
|
|
642
|
-
@property
|
641
|
+
@_builtins.property
|
643
642
|
@pulumi.getter
|
644
|
-
def type(self) -> pulumi.Output[
|
643
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
645
644
|
"""
|
646
645
|
`(string)` – Type of configuration computed by Vault
|
647
646
|
"""
|
648
647
|
return pulumi.get(self, "type")
|
649
648
|
|
650
|
-
@property
|
649
|
+
@_builtins.property
|
651
650
|
@pulumi.getter(name="useSignature")
|
652
|
-
def use_signature(self) -> pulumi.Output[
|
651
|
+
def use_signature(self) -> pulumi.Output[_builtins.bool]:
|
653
652
|
"""
|
654
653
|
`(string)` – If set to true, enables use of PingID signature. Computed by Vault
|
655
654
|
"""
|
656
655
|
return pulumi.get(self, "use_signature")
|
657
656
|
|
658
|
-
@property
|
657
|
+
@_builtins.property
|
659
658
|
@pulumi.getter(name="usernameFormat")
|
660
|
-
def username_format(self) -> pulumi.Output[Optional[
|
659
|
+
def username_format(self) -> pulumi.Output[Optional[_builtins.str]]:
|
661
660
|
"""
|
662
661
|
`(string)` - A format string for mapping Identity names to MFA method names.
|
663
662
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|