pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,51 +21,51 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
22
21
  @pulumi.input_type
23
22
  class AuthBackendArgs:
24
23
  def __init__(__self__, *,
25
- organization: pulumi.Input[builtins.str],
26
- base_url: Optional[pulumi.Input[builtins.str]] = None,
27
- bypass_okta_mfa: Optional[pulumi.Input[builtins.bool]] = None,
28
- description: Optional[pulumi.Input[builtins.str]] = None,
29
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
24
+ organization: pulumi.Input[_builtins.str],
25
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
26
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
27
+ description: Optional[pulumi.Input[_builtins.str]] = None,
28
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
30
29
  groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
31
- namespace: Optional[pulumi.Input[builtins.str]] = None,
32
- path: Optional[pulumi.Input[builtins.str]] = None,
33
- token: Optional[pulumi.Input[builtins.str]] = None,
34
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
35
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
36
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
37
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
38
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
39
- token_period: Optional[pulumi.Input[builtins.int]] = None,
40
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
41
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
42
- token_type: Optional[pulumi.Input[builtins.str]] = None,
30
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
31
+ path: Optional[pulumi.Input[_builtins.str]] = None,
32
+ token: Optional[pulumi.Input[_builtins.str]] = None,
33
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
38
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
39
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
40
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
41
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
43
42
  users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
44
43
  """
45
44
  The set of arguments for constructing a AuthBackend resource.
46
- :param pulumi.Input[builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
47
- :param pulumi.Input[builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
48
- :param pulumi.Input[builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
49
- :param pulumi.Input[builtins.str] description: The description of the auth backend
50
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
45
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
46
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
47
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
48
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
49
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
51
50
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
52
51
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
53
52
  See below for more details.
54
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
53
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
55
54
  The value should not contain leading or trailing forward slashes.
56
55
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
57
56
  *Available only for Vault Enterprise*.
58
- :param pulumi.Input[builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
59
- :param pulumi.Input[builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
57
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
58
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
60
59
  If this is not supplied only locally configured groups will be enabled.
61
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
62
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
63
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
64
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
65
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
66
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
67
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
68
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
69
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
60
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
61
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
62
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
63
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
64
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
65
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
66
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
67
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
68
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
70
69
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
71
70
  See below for more details.
72
71
  """
@@ -108,57 +107,57 @@ class AuthBackendArgs:
108
107
  if users is not None:
109
108
  pulumi.set(__self__, "users", users)
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def organization(self) -> pulumi.Input[builtins.str]:
112
+ def organization(self) -> pulumi.Input[_builtins.str]:
114
113
  """
115
114
  The Okta organization. This will be the first part of the url `https://XXX.okta.com`
116
115
  """
117
116
  return pulumi.get(self, "organization")
118
117
 
119
118
  @organization.setter
120
- def organization(self, value: pulumi.Input[builtins.str]):
119
+ def organization(self, value: pulumi.Input[_builtins.str]):
121
120
  pulumi.set(self, "organization", value)
122
121
 
123
- @property
122
+ @_builtins.property
124
123
  @pulumi.getter(name="baseUrl")
125
- def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
124
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
126
125
  """
127
126
  The Okta url. Examples: oktapreview.com, okta.com
128
127
  """
129
128
  return pulumi.get(self, "base_url")
130
129
 
131
130
  @base_url.setter
132
- def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
131
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
133
132
  pulumi.set(self, "base_url", value)
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter(name="bypassOktaMfa")
137
- def bypass_okta_mfa(self) -> Optional[pulumi.Input[builtins.bool]]:
136
+ def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
138
137
  """
139
138
  When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
140
139
  """
141
140
  return pulumi.get(self, "bypass_okta_mfa")
142
141
 
143
142
  @bypass_okta_mfa.setter
144
- def bypass_okta_mfa(self, value: Optional[pulumi.Input[builtins.bool]]):
143
+ def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
145
144
  pulumi.set(self, "bypass_okta_mfa", value)
146
145
 
147
- @property
146
+ @_builtins.property
148
147
  @pulumi.getter
149
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
148
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
150
149
  """
151
150
  The description of the auth backend
152
151
  """
153
152
  return pulumi.get(self, "description")
154
153
 
155
154
  @description.setter
156
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
155
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
157
156
  pulumi.set(self, "description", value)
158
157
 
159
- @property
158
+ @_builtins.property
160
159
  @pulumi.getter(name="disableRemount")
161
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
160
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
162
161
  """
163
162
  If set, opts out of mount migration on path updates.
164
163
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -166,10 +165,10 @@ class AuthBackendArgs:
166
165
  return pulumi.get(self, "disable_remount")
167
166
 
168
167
  @disable_remount.setter
169
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
168
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
170
169
  pulumi.set(self, "disable_remount", value)
171
170
 
172
- @property
171
+ @_builtins.property
173
172
  @pulumi.getter
174
173
  def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
175
174
  """
@@ -182,9 +181,9 @@ class AuthBackendArgs:
182
181
  def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
183
182
  pulumi.set(self, "groups", value)
184
183
 
185
- @property
184
+ @_builtins.property
186
185
  @pulumi.getter
187
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
186
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
188
187
  """
189
188
  The namespace to provision the resource in.
190
189
  The value should not contain leading or trailing forward slashes.
@@ -194,24 +193,24 @@ class AuthBackendArgs:
194
193
  return pulumi.get(self, "namespace")
195
194
 
196
195
  @namespace.setter
197
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
196
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
198
197
  pulumi.set(self, "namespace", value)
199
198
 
200
- @property
199
+ @_builtins.property
201
200
  @pulumi.getter
202
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
201
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
203
202
  """
204
203
  Path to mount the Okta auth backend. Default to path `okta`.
205
204
  """
206
205
  return pulumi.get(self, "path")
207
206
 
208
207
  @path.setter
209
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
208
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
210
209
  pulumi.set(self, "path", value)
211
210
 
212
- @property
211
+ @_builtins.property
213
212
  @pulumi.getter
214
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
213
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
215
214
  """
216
215
  The Okta API token. This is required to query Okta for user group membership.
217
216
  If this is not supplied only locally configured groups will be enabled.
@@ -219,118 +218,118 @@ class AuthBackendArgs:
219
218
  return pulumi.get(self, "token")
220
219
 
221
220
  @token.setter
222
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
221
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
223
222
  pulumi.set(self, "token", value)
224
223
 
225
- @property
224
+ @_builtins.property
226
225
  @pulumi.getter(name="tokenBoundCidrs")
227
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
226
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
228
227
  """
229
228
  Specifies the blocks of IP addresses which are allowed to use the generated token
230
229
  """
231
230
  return pulumi.get(self, "token_bound_cidrs")
232
231
 
233
232
  @token_bound_cidrs.setter
234
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
233
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
235
234
  pulumi.set(self, "token_bound_cidrs", value)
236
235
 
237
- @property
236
+ @_builtins.property
238
237
  @pulumi.getter(name="tokenExplicitMaxTtl")
239
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
238
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
240
239
  """
241
240
  Generated Token's Explicit Maximum TTL in seconds
242
241
  """
243
242
  return pulumi.get(self, "token_explicit_max_ttl")
244
243
 
245
244
  @token_explicit_max_ttl.setter
246
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
245
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
247
246
  pulumi.set(self, "token_explicit_max_ttl", value)
248
247
 
249
- @property
248
+ @_builtins.property
250
249
  @pulumi.getter(name="tokenMaxTtl")
251
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
250
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
252
251
  """
253
252
  The maximum lifetime of the generated token
254
253
  """
255
254
  return pulumi.get(self, "token_max_ttl")
256
255
 
257
256
  @token_max_ttl.setter
258
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
257
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
259
258
  pulumi.set(self, "token_max_ttl", value)
260
259
 
261
- @property
260
+ @_builtins.property
262
261
  @pulumi.getter(name="tokenNoDefaultPolicy")
263
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
262
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
264
263
  """
265
264
  If true, the 'default' policy will not automatically be added to generated tokens
266
265
  """
267
266
  return pulumi.get(self, "token_no_default_policy")
268
267
 
269
268
  @token_no_default_policy.setter
270
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
269
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
271
270
  pulumi.set(self, "token_no_default_policy", value)
272
271
 
273
- @property
272
+ @_builtins.property
274
273
  @pulumi.getter(name="tokenNumUses")
275
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
274
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
276
275
  """
277
276
  The maximum number of times a token may be used, a value of zero means unlimited
278
277
  """
279
278
  return pulumi.get(self, "token_num_uses")
280
279
 
281
280
  @token_num_uses.setter
282
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
281
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
283
282
  pulumi.set(self, "token_num_uses", value)
284
283
 
285
- @property
284
+ @_builtins.property
286
285
  @pulumi.getter(name="tokenPeriod")
287
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
286
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
288
287
  """
289
288
  Generated Token's Period
290
289
  """
291
290
  return pulumi.get(self, "token_period")
292
291
 
293
292
  @token_period.setter
294
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
293
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
295
294
  pulumi.set(self, "token_period", value)
296
295
 
297
- @property
296
+ @_builtins.property
298
297
  @pulumi.getter(name="tokenPolicies")
299
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
298
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
300
299
  """
301
300
  Generated Token's Policies
302
301
  """
303
302
  return pulumi.get(self, "token_policies")
304
303
 
305
304
  @token_policies.setter
306
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
305
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
307
306
  pulumi.set(self, "token_policies", value)
308
307
 
309
- @property
308
+ @_builtins.property
310
309
  @pulumi.getter(name="tokenTtl")
311
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
310
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
312
311
  """
313
312
  The initial ttl of the token to generate in seconds
314
313
  """
315
314
  return pulumi.get(self, "token_ttl")
316
315
 
317
316
  @token_ttl.setter
318
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
317
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
319
318
  pulumi.set(self, "token_ttl", value)
320
319
 
321
- @property
320
+ @_builtins.property
322
321
  @pulumi.getter(name="tokenType")
323
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
322
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
324
323
  """
325
324
  The type of token to generate, service or batch
326
325
  """
327
326
  return pulumi.get(self, "token_type")
328
327
 
329
328
  @token_type.setter
330
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
329
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
331
330
  pulumi.set(self, "token_type", value)
332
331
 
333
- @property
332
+ @_builtins.property
334
333
  @pulumi.getter
335
334
  def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
336
335
  """
@@ -347,53 +346,53 @@ class AuthBackendArgs:
347
346
  @pulumi.input_type
348
347
  class _AuthBackendState:
349
348
  def __init__(__self__, *,
350
- accessor: Optional[pulumi.Input[builtins.str]] = None,
351
- base_url: Optional[pulumi.Input[builtins.str]] = None,
352
- bypass_okta_mfa: Optional[pulumi.Input[builtins.bool]] = None,
353
- description: Optional[pulumi.Input[builtins.str]] = None,
354
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
349
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
350
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
351
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
352
+ description: Optional[pulumi.Input[_builtins.str]] = None,
353
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
355
354
  groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
356
- namespace: Optional[pulumi.Input[builtins.str]] = None,
357
- organization: Optional[pulumi.Input[builtins.str]] = None,
358
- path: Optional[pulumi.Input[builtins.str]] = None,
359
- token: Optional[pulumi.Input[builtins.str]] = None,
360
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
361
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
362
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
363
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
364
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
365
- token_period: Optional[pulumi.Input[builtins.int]] = None,
366
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
367
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
368
- token_type: Optional[pulumi.Input[builtins.str]] = None,
355
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
356
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
357
+ path: Optional[pulumi.Input[_builtins.str]] = None,
358
+ token: Optional[pulumi.Input[_builtins.str]] = None,
359
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
360
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
361
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
362
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
363
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
364
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
365
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
366
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
367
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
369
368
  users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
370
369
  """
371
370
  Input properties used for looking up and filtering AuthBackend resources.
372
- :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
373
- :param pulumi.Input[builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
374
- :param pulumi.Input[builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
375
- :param pulumi.Input[builtins.str] description: The description of the auth backend
376
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
371
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
372
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
373
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
374
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
375
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
377
376
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
378
377
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
379
378
  See below for more details.
380
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
379
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
381
380
  The value should not contain leading or trailing forward slashes.
382
381
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
383
382
  *Available only for Vault Enterprise*.
384
- :param pulumi.Input[builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
385
- :param pulumi.Input[builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
386
- :param pulumi.Input[builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
383
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
384
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
385
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
387
386
  If this is not supplied only locally configured groups will be enabled.
388
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
389
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
390
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
391
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
392
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
393
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
394
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
395
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
396
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
387
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
388
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
389
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
390
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
391
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
392
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
393
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
394
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
395
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
397
396
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
398
397
  See below for more details.
399
398
  """
@@ -438,57 +437,57 @@ class _AuthBackendState:
438
437
  if users is not None:
439
438
  pulumi.set(__self__, "users", users)
440
439
 
441
- @property
440
+ @_builtins.property
442
441
  @pulumi.getter
443
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
442
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
444
443
  """
445
444
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
446
445
  """
447
446
  return pulumi.get(self, "accessor")
448
447
 
449
448
  @accessor.setter
450
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
449
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
451
450
  pulumi.set(self, "accessor", value)
452
451
 
453
- @property
452
+ @_builtins.property
454
453
  @pulumi.getter(name="baseUrl")
455
- def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
454
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
456
455
  """
457
456
  The Okta url. Examples: oktapreview.com, okta.com
458
457
  """
459
458
  return pulumi.get(self, "base_url")
460
459
 
461
460
  @base_url.setter
462
- def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
461
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
463
462
  pulumi.set(self, "base_url", value)
464
463
 
465
- @property
464
+ @_builtins.property
466
465
  @pulumi.getter(name="bypassOktaMfa")
467
- def bypass_okta_mfa(self) -> Optional[pulumi.Input[builtins.bool]]:
466
+ def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
468
467
  """
469
468
  When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
470
469
  """
471
470
  return pulumi.get(self, "bypass_okta_mfa")
472
471
 
473
472
  @bypass_okta_mfa.setter
474
- def bypass_okta_mfa(self, value: Optional[pulumi.Input[builtins.bool]]):
473
+ def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
475
474
  pulumi.set(self, "bypass_okta_mfa", value)
476
475
 
477
- @property
476
+ @_builtins.property
478
477
  @pulumi.getter
479
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
478
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
480
479
  """
481
480
  The description of the auth backend
482
481
  """
483
482
  return pulumi.get(self, "description")
484
483
 
485
484
  @description.setter
486
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
485
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
487
486
  pulumi.set(self, "description", value)
488
487
 
489
- @property
488
+ @_builtins.property
490
489
  @pulumi.getter(name="disableRemount")
491
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
490
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
492
491
  """
493
492
  If set, opts out of mount migration on path updates.
494
493
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -496,10 +495,10 @@ class _AuthBackendState:
496
495
  return pulumi.get(self, "disable_remount")
497
496
 
498
497
  @disable_remount.setter
499
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
498
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
500
499
  pulumi.set(self, "disable_remount", value)
501
500
 
502
- @property
501
+ @_builtins.property
503
502
  @pulumi.getter
504
503
  def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
505
504
  """
@@ -512,9 +511,9 @@ class _AuthBackendState:
512
511
  def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
513
512
  pulumi.set(self, "groups", value)
514
513
 
515
- @property
514
+ @_builtins.property
516
515
  @pulumi.getter
517
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
516
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
518
517
  """
519
518
  The namespace to provision the resource in.
520
519
  The value should not contain leading or trailing forward slashes.
@@ -524,36 +523,36 @@ class _AuthBackendState:
524
523
  return pulumi.get(self, "namespace")
525
524
 
526
525
  @namespace.setter
527
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
526
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
528
527
  pulumi.set(self, "namespace", value)
529
528
 
530
- @property
529
+ @_builtins.property
531
530
  @pulumi.getter
532
- def organization(self) -> Optional[pulumi.Input[builtins.str]]:
531
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
533
532
  """
534
533
  The Okta organization. This will be the first part of the url `https://XXX.okta.com`
535
534
  """
536
535
  return pulumi.get(self, "organization")
537
536
 
538
537
  @organization.setter
539
- def organization(self, value: Optional[pulumi.Input[builtins.str]]):
538
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
540
539
  pulumi.set(self, "organization", value)
541
540
 
542
- @property
541
+ @_builtins.property
543
542
  @pulumi.getter
544
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
543
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
545
544
  """
546
545
  Path to mount the Okta auth backend. Default to path `okta`.
547
546
  """
548
547
  return pulumi.get(self, "path")
549
548
 
550
549
  @path.setter
551
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
550
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
552
551
  pulumi.set(self, "path", value)
553
552
 
554
- @property
553
+ @_builtins.property
555
554
  @pulumi.getter
556
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
555
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
557
556
  """
558
557
  The Okta API token. This is required to query Okta for user group membership.
559
558
  If this is not supplied only locally configured groups will be enabled.
@@ -561,118 +560,118 @@ class _AuthBackendState:
561
560
  return pulumi.get(self, "token")
562
561
 
563
562
  @token.setter
564
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
563
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
565
564
  pulumi.set(self, "token", value)
566
565
 
567
- @property
566
+ @_builtins.property
568
567
  @pulumi.getter(name="tokenBoundCidrs")
569
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
568
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
570
569
  """
571
570
  Specifies the blocks of IP addresses which are allowed to use the generated token
572
571
  """
573
572
  return pulumi.get(self, "token_bound_cidrs")
574
573
 
575
574
  @token_bound_cidrs.setter
576
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
575
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
577
576
  pulumi.set(self, "token_bound_cidrs", value)
578
577
 
579
- @property
578
+ @_builtins.property
580
579
  @pulumi.getter(name="tokenExplicitMaxTtl")
581
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
580
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
582
581
  """
583
582
  Generated Token's Explicit Maximum TTL in seconds
584
583
  """
585
584
  return pulumi.get(self, "token_explicit_max_ttl")
586
585
 
587
586
  @token_explicit_max_ttl.setter
588
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
587
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
589
588
  pulumi.set(self, "token_explicit_max_ttl", value)
590
589
 
591
- @property
590
+ @_builtins.property
592
591
  @pulumi.getter(name="tokenMaxTtl")
593
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
592
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
594
593
  """
595
594
  The maximum lifetime of the generated token
596
595
  """
597
596
  return pulumi.get(self, "token_max_ttl")
598
597
 
599
598
  @token_max_ttl.setter
600
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
599
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
601
600
  pulumi.set(self, "token_max_ttl", value)
602
601
 
603
- @property
602
+ @_builtins.property
604
603
  @pulumi.getter(name="tokenNoDefaultPolicy")
605
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
604
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
606
605
  """
607
606
  If true, the 'default' policy will not automatically be added to generated tokens
608
607
  """
609
608
  return pulumi.get(self, "token_no_default_policy")
610
609
 
611
610
  @token_no_default_policy.setter
612
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
611
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
613
612
  pulumi.set(self, "token_no_default_policy", value)
614
613
 
615
- @property
614
+ @_builtins.property
616
615
  @pulumi.getter(name="tokenNumUses")
617
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
616
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
618
617
  """
619
618
  The maximum number of times a token may be used, a value of zero means unlimited
620
619
  """
621
620
  return pulumi.get(self, "token_num_uses")
622
621
 
623
622
  @token_num_uses.setter
624
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
623
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
625
624
  pulumi.set(self, "token_num_uses", value)
626
625
 
627
- @property
626
+ @_builtins.property
628
627
  @pulumi.getter(name="tokenPeriod")
629
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
628
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
630
629
  """
631
630
  Generated Token's Period
632
631
  """
633
632
  return pulumi.get(self, "token_period")
634
633
 
635
634
  @token_period.setter
636
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
635
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
637
636
  pulumi.set(self, "token_period", value)
638
637
 
639
- @property
638
+ @_builtins.property
640
639
  @pulumi.getter(name="tokenPolicies")
641
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
640
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
642
641
  """
643
642
  Generated Token's Policies
644
643
  """
645
644
  return pulumi.get(self, "token_policies")
646
645
 
647
646
  @token_policies.setter
648
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
647
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
649
648
  pulumi.set(self, "token_policies", value)
650
649
 
651
- @property
650
+ @_builtins.property
652
651
  @pulumi.getter(name="tokenTtl")
653
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
652
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
654
653
  """
655
654
  The initial ttl of the token to generate in seconds
656
655
  """
657
656
  return pulumi.get(self, "token_ttl")
658
657
 
659
658
  @token_ttl.setter
660
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
659
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
661
660
  pulumi.set(self, "token_ttl", value)
662
661
 
663
- @property
662
+ @_builtins.property
664
663
  @pulumi.getter(name="tokenType")
665
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
664
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
666
665
  """
667
666
  The type of token to generate, service or batch
668
667
  """
669
668
  return pulumi.get(self, "token_type")
670
669
 
671
670
  @token_type.setter
672
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
671
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
673
672
  pulumi.set(self, "token_type", value)
674
673
 
675
- @property
674
+ @_builtins.property
676
675
  @pulumi.getter
677
676
  def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
678
677
  """
@@ -692,24 +691,24 @@ class AuthBackend(pulumi.CustomResource):
692
691
  def __init__(__self__,
693
692
  resource_name: str,
694
693
  opts: Optional[pulumi.ResourceOptions] = None,
695
- base_url: Optional[pulumi.Input[builtins.str]] = None,
696
- bypass_okta_mfa: Optional[pulumi.Input[builtins.bool]] = None,
697
- description: Optional[pulumi.Input[builtins.str]] = None,
698
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
694
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
695
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
696
+ description: Optional[pulumi.Input[_builtins.str]] = None,
697
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
699
698
  groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
700
- namespace: Optional[pulumi.Input[builtins.str]] = None,
701
- organization: Optional[pulumi.Input[builtins.str]] = None,
702
- path: Optional[pulumi.Input[builtins.str]] = None,
703
- token: Optional[pulumi.Input[builtins.str]] = None,
704
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
705
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
706
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
707
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
708
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
709
- token_period: Optional[pulumi.Input[builtins.int]] = None,
710
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
711
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
712
- token_type: Optional[pulumi.Input[builtins.str]] = None,
699
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
700
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
701
+ path: Optional[pulumi.Input[_builtins.str]] = None,
702
+ token: Optional[pulumi.Input[_builtins.str]] = None,
703
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
704
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
705
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
706
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
707
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
708
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
709
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
710
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
711
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
713
712
  users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
714
713
  __props__=None):
715
714
  """
@@ -749,30 +748,30 @@ class AuthBackend(pulumi.CustomResource):
749
748
 
750
749
  :param str resource_name: The name of the resource.
751
750
  :param pulumi.ResourceOptions opts: Options for the resource.
752
- :param pulumi.Input[builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
753
- :param pulumi.Input[builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
754
- :param pulumi.Input[builtins.str] description: The description of the auth backend
755
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
751
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
752
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
753
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
754
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
756
755
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
757
756
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
758
757
  See below for more details.
759
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
758
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
760
759
  The value should not contain leading or trailing forward slashes.
761
760
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
762
761
  *Available only for Vault Enterprise*.
763
- :param pulumi.Input[builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
764
- :param pulumi.Input[builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
765
- :param pulumi.Input[builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
762
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
763
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
764
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
766
765
  If this is not supplied only locally configured groups will be enabled.
767
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
768
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
769
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
770
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
771
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
772
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
773
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
774
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
775
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
766
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
767
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
768
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
769
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
770
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
771
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
772
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
773
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
774
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
776
775
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
777
776
  See below for more details.
778
777
  """
@@ -832,24 +831,24 @@ class AuthBackend(pulumi.CustomResource):
832
831
  def _internal_init(__self__,
833
832
  resource_name: str,
834
833
  opts: Optional[pulumi.ResourceOptions] = None,
835
- base_url: Optional[pulumi.Input[builtins.str]] = None,
836
- bypass_okta_mfa: Optional[pulumi.Input[builtins.bool]] = None,
837
- description: Optional[pulumi.Input[builtins.str]] = None,
838
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
834
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
835
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
836
+ description: Optional[pulumi.Input[_builtins.str]] = None,
837
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
839
838
  groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
840
- namespace: Optional[pulumi.Input[builtins.str]] = None,
841
- organization: Optional[pulumi.Input[builtins.str]] = None,
842
- path: Optional[pulumi.Input[builtins.str]] = None,
843
- token: Optional[pulumi.Input[builtins.str]] = None,
844
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
845
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
846
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
847
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
848
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
849
- token_period: Optional[pulumi.Input[builtins.int]] = None,
850
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
851
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
852
- token_type: Optional[pulumi.Input[builtins.str]] = None,
839
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
840
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
841
+ path: Optional[pulumi.Input[_builtins.str]] = None,
842
+ token: Optional[pulumi.Input[_builtins.str]] = None,
843
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
844
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
845
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
846
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
847
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
848
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
849
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
850
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
851
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
853
852
  users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
854
853
  __props__=None):
855
854
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -894,25 +893,25 @@ class AuthBackend(pulumi.CustomResource):
894
893
  def get(resource_name: str,
895
894
  id: pulumi.Input[str],
896
895
  opts: Optional[pulumi.ResourceOptions] = None,
897
- accessor: Optional[pulumi.Input[builtins.str]] = None,
898
- base_url: Optional[pulumi.Input[builtins.str]] = None,
899
- bypass_okta_mfa: Optional[pulumi.Input[builtins.bool]] = None,
900
- description: Optional[pulumi.Input[builtins.str]] = None,
901
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
896
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
897
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
898
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
899
+ description: Optional[pulumi.Input[_builtins.str]] = None,
900
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
902
901
  groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
903
- namespace: Optional[pulumi.Input[builtins.str]] = None,
904
- organization: Optional[pulumi.Input[builtins.str]] = None,
905
- path: Optional[pulumi.Input[builtins.str]] = None,
906
- token: Optional[pulumi.Input[builtins.str]] = None,
907
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
908
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
909
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
910
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
911
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
912
- token_period: Optional[pulumi.Input[builtins.int]] = None,
913
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
914
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
915
- token_type: Optional[pulumi.Input[builtins.str]] = None,
902
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
903
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
904
+ path: Optional[pulumi.Input[_builtins.str]] = None,
905
+ token: Optional[pulumi.Input[_builtins.str]] = None,
906
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
907
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
908
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
909
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
910
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
911
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
912
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
913
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
914
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
916
915
  users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
917
916
  """
918
917
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
@@ -921,31 +920,31 @@ class AuthBackend(pulumi.CustomResource):
921
920
  :param str resource_name: The unique name of the resulting resource.
922
921
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
923
922
  :param pulumi.ResourceOptions opts: Options for the resource.
924
- :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
925
- :param pulumi.Input[builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
926
- :param pulumi.Input[builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
927
- :param pulumi.Input[builtins.str] description: The description of the auth backend
928
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
923
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
924
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
925
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
926
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
927
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
929
928
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
930
929
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
931
930
  See below for more details.
932
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
931
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
933
932
  The value should not contain leading or trailing forward slashes.
934
933
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
935
934
  *Available only for Vault Enterprise*.
936
- :param pulumi.Input[builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
937
- :param pulumi.Input[builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
938
- :param pulumi.Input[builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
935
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
936
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
937
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
939
938
  If this is not supplied only locally configured groups will be enabled.
940
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
941
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
942
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
943
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
944
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
945
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
946
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
947
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
948
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
939
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
940
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
941
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
942
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
943
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
944
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
945
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
946
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
947
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
949
948
  :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
950
949
  See below for more details.
951
950
  """
@@ -975,48 +974,48 @@ class AuthBackend(pulumi.CustomResource):
975
974
  __props__.__dict__["users"] = users
976
975
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
977
976
 
978
- @property
977
+ @_builtins.property
979
978
  @pulumi.getter
980
- def accessor(self) -> pulumi.Output[builtins.str]:
979
+ def accessor(self) -> pulumi.Output[_builtins.str]:
981
980
  """
982
981
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
983
982
  """
984
983
  return pulumi.get(self, "accessor")
985
984
 
986
- @property
985
+ @_builtins.property
987
986
  @pulumi.getter(name="baseUrl")
988
- def base_url(self) -> pulumi.Output[Optional[builtins.str]]:
987
+ def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
989
988
  """
990
989
  The Okta url. Examples: oktapreview.com, okta.com
991
990
  """
992
991
  return pulumi.get(self, "base_url")
993
992
 
994
- @property
993
+ @_builtins.property
995
994
  @pulumi.getter(name="bypassOktaMfa")
996
- def bypass_okta_mfa(self) -> pulumi.Output[Optional[builtins.bool]]:
995
+ def bypass_okta_mfa(self) -> pulumi.Output[Optional[_builtins.bool]]:
997
996
  """
998
997
  When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
999
998
  """
1000
999
  return pulumi.get(self, "bypass_okta_mfa")
1001
1000
 
1002
- @property
1001
+ @_builtins.property
1003
1002
  @pulumi.getter
1004
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1003
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1005
1004
  """
1006
1005
  The description of the auth backend
1007
1006
  """
1008
1007
  return pulumi.get(self, "description")
1009
1008
 
1010
- @property
1009
+ @_builtins.property
1011
1010
  @pulumi.getter(name="disableRemount")
1012
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1011
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1013
1012
  """
1014
1013
  If set, opts out of mount migration on path updates.
1015
1014
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1016
1015
  """
1017
1016
  return pulumi.get(self, "disable_remount")
1018
1017
 
1019
- @property
1018
+ @_builtins.property
1020
1019
  @pulumi.getter
1021
1020
  def groups(self) -> pulumi.Output[Sequence['outputs.AuthBackendGroup']]:
1022
1021
  """
@@ -1025,9 +1024,9 @@ class AuthBackend(pulumi.CustomResource):
1025
1024
  """
1026
1025
  return pulumi.get(self, "groups")
1027
1026
 
1028
- @property
1027
+ @_builtins.property
1029
1028
  @pulumi.getter
1030
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1029
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1031
1030
  """
1032
1031
  The namespace to provision the resource in.
1033
1032
  The value should not contain leading or trailing forward slashes.
@@ -1036,104 +1035,104 @@ class AuthBackend(pulumi.CustomResource):
1036
1035
  """
1037
1036
  return pulumi.get(self, "namespace")
1038
1037
 
1039
- @property
1038
+ @_builtins.property
1040
1039
  @pulumi.getter
1041
- def organization(self) -> pulumi.Output[builtins.str]:
1040
+ def organization(self) -> pulumi.Output[_builtins.str]:
1042
1041
  """
1043
1042
  The Okta organization. This will be the first part of the url `https://XXX.okta.com`
1044
1043
  """
1045
1044
  return pulumi.get(self, "organization")
1046
1045
 
1047
- @property
1046
+ @_builtins.property
1048
1047
  @pulumi.getter
1049
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1048
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1050
1049
  """
1051
1050
  Path to mount the Okta auth backend. Default to path `okta`.
1052
1051
  """
1053
1052
  return pulumi.get(self, "path")
1054
1053
 
1055
- @property
1054
+ @_builtins.property
1056
1055
  @pulumi.getter
1057
- def token(self) -> pulumi.Output[Optional[builtins.str]]:
1056
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
1058
1057
  """
1059
1058
  The Okta API token. This is required to query Okta for user group membership.
1060
1059
  If this is not supplied only locally configured groups will be enabled.
1061
1060
  """
1062
1061
  return pulumi.get(self, "token")
1063
1062
 
1064
- @property
1063
+ @_builtins.property
1065
1064
  @pulumi.getter(name="tokenBoundCidrs")
1066
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1065
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1067
1066
  """
1068
1067
  Specifies the blocks of IP addresses which are allowed to use the generated token
1069
1068
  """
1070
1069
  return pulumi.get(self, "token_bound_cidrs")
1071
1070
 
1072
- @property
1071
+ @_builtins.property
1073
1072
  @pulumi.getter(name="tokenExplicitMaxTtl")
1074
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1073
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1075
1074
  """
1076
1075
  Generated Token's Explicit Maximum TTL in seconds
1077
1076
  """
1078
1077
  return pulumi.get(self, "token_explicit_max_ttl")
1079
1078
 
1080
- @property
1079
+ @_builtins.property
1081
1080
  @pulumi.getter(name="tokenMaxTtl")
1082
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1081
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1083
1082
  """
1084
1083
  The maximum lifetime of the generated token
1085
1084
  """
1086
1085
  return pulumi.get(self, "token_max_ttl")
1087
1086
 
1088
- @property
1087
+ @_builtins.property
1089
1088
  @pulumi.getter(name="tokenNoDefaultPolicy")
1090
- def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
1089
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1091
1090
  """
1092
1091
  If true, the 'default' policy will not automatically be added to generated tokens
1093
1092
  """
1094
1093
  return pulumi.get(self, "token_no_default_policy")
1095
1094
 
1096
- @property
1095
+ @_builtins.property
1097
1096
  @pulumi.getter(name="tokenNumUses")
1098
- def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
1097
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1099
1098
  """
1100
1099
  The maximum number of times a token may be used, a value of zero means unlimited
1101
1100
  """
1102
1101
  return pulumi.get(self, "token_num_uses")
1103
1102
 
1104
- @property
1103
+ @_builtins.property
1105
1104
  @pulumi.getter(name="tokenPeriod")
1106
- def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
1105
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1107
1106
  """
1108
1107
  Generated Token's Period
1109
1108
  """
1110
1109
  return pulumi.get(self, "token_period")
1111
1110
 
1112
- @property
1111
+ @_builtins.property
1113
1112
  @pulumi.getter(name="tokenPolicies")
1114
- def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1113
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1115
1114
  """
1116
1115
  Generated Token's Policies
1117
1116
  """
1118
1117
  return pulumi.get(self, "token_policies")
1119
1118
 
1120
- @property
1119
+ @_builtins.property
1121
1120
  @pulumi.getter(name="tokenTtl")
1122
- def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1121
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1123
1122
  """
1124
1123
  The initial ttl of the token to generate in seconds
1125
1124
  """
1126
1125
  return pulumi.get(self, "token_ttl")
1127
1126
 
1128
- @property
1127
+ @_builtins.property
1129
1128
  @pulumi.getter(name="tokenType")
1130
- def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
1129
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1131
1130
  """
1132
1131
  The type of token to generate, service or batch
1133
1132
  """
1134
1133
  return pulumi.get(self, "token_type")
1135
1134
 
1136
- @property
1135
+ @_builtins.property
1137
1136
  @pulumi.getter
1138
1137
  def users(self) -> pulumi.Output[Sequence['outputs.AuthBackendUser']]:
1139
1138
  """