pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,670 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['MfaPingidArgs', 'MfaPingid']
18
+
19
+ @pulumi.input_type
20
+ class MfaPingidArgs:
21
+ def __init__(__self__, *,
22
+ mount_accessor: pulumi.Input[_builtins.str],
23
+ settings_file_base64: pulumi.Input[_builtins.str],
24
+ name: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ username_format: Optional[pulumi.Input[_builtins.str]] = None):
27
+ """
28
+ The set of arguments for constructing a MfaPingid resource.
29
+ :param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
30
+ The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
31
+ :param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
32
+ from PingID's configuration page.
33
+ :param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
34
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
35
+ The value should not contain leading or trailing forward slashes.
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
37
+ *Available only for Vault Enterprise*.
38
+ :param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
39
+ Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
40
+ If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
41
+ - alias.name: The name returned by the mount configured via the `mount_accessor` parameter
42
+ - entity.name: The name configured for the Entity
43
+ - alias.metadata.`<key>`: The value of the Alias's metadata parameter
44
+ - entity.metadata.`<key>`: The value of the Entity's metadata parameter
45
+ """
46
+ pulumi.set(__self__, "mount_accessor", mount_accessor)
47
+ pulumi.set(__self__, "settings_file_base64", settings_file_base64)
48
+ if name is not None:
49
+ pulumi.set(__self__, "name", name)
50
+ if namespace is not None:
51
+ pulumi.set(__self__, "namespace", namespace)
52
+ if username_format is not None:
53
+ pulumi.set(__self__, "username_format", username_format)
54
+
55
+ @_builtins.property
56
+ @pulumi.getter(name="mountAccessor")
57
+ def mount_accessor(self) -> pulumi.Input[_builtins.str]:
58
+ """
59
+ `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
60
+ The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
61
+ """
62
+ return pulumi.get(self, "mount_accessor")
63
+
64
+ @mount_accessor.setter
65
+ def mount_accessor(self, value: pulumi.Input[_builtins.str]):
66
+ pulumi.set(self, "mount_accessor", value)
67
+
68
+ @_builtins.property
69
+ @pulumi.getter(name="settingsFileBase64")
70
+ def settings_file_base64(self) -> pulumi.Input[_builtins.str]:
71
+ """
72
+ `(string: <required>)` - A base64-encoded third-party settings file retrieved
73
+ from PingID's configuration page.
74
+ """
75
+ return pulumi.get(self, "settings_file_base64")
76
+
77
+ @settings_file_base64.setter
78
+ def settings_file_base64(self, value: pulumi.Input[_builtins.str]):
79
+ pulumi.set(self, "settings_file_base64", value)
80
+
81
+ @_builtins.property
82
+ @pulumi.getter
83
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
84
+ """
85
+ `(string: <required>)` – Name of the MFA method.
86
+ """
87
+ return pulumi.get(self, "name")
88
+
89
+ @name.setter
90
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
91
+ pulumi.set(self, "name", value)
92
+
93
+ @_builtins.property
94
+ @pulumi.getter
95
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
96
+ """
97
+ The namespace to provision the resource in.
98
+ The value should not contain leading or trailing forward slashes.
99
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
100
+ *Available only for Vault Enterprise*.
101
+ """
102
+ return pulumi.get(self, "namespace")
103
+
104
+ @namespace.setter
105
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
106
+ pulumi.set(self, "namespace", value)
107
+
108
+ @_builtins.property
109
+ @pulumi.getter(name="usernameFormat")
110
+ def username_format(self) -> Optional[pulumi.Input[_builtins.str]]:
111
+ """
112
+ `(string)` - A format string for mapping Identity names to MFA method names.
113
+ Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
114
+ If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
115
+ - alias.name: The name returned by the mount configured via the `mount_accessor` parameter
116
+ - entity.name: The name configured for the Entity
117
+ - alias.metadata.`<key>`: The value of the Alias's metadata parameter
118
+ - entity.metadata.`<key>`: The value of the Entity's metadata parameter
119
+ """
120
+ return pulumi.get(self, "username_format")
121
+
122
+ @username_format.setter
123
+ def username_format(self, value: Optional[pulumi.Input[_builtins.str]]):
124
+ pulumi.set(self, "username_format", value)
125
+
126
+
127
+ @pulumi.input_type
128
+ class _MfaPingidState:
129
+ def __init__(__self__, *,
130
+ admin_url: Optional[pulumi.Input[_builtins.str]] = None,
131
+ authenticator_url: Optional[pulumi.Input[_builtins.str]] = None,
132
+ idp_url: Optional[pulumi.Input[_builtins.str]] = None,
133
+ mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
134
+ name: Optional[pulumi.Input[_builtins.str]] = None,
135
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
136
+ namespace_id: Optional[pulumi.Input[_builtins.str]] = None,
137
+ org_alias: Optional[pulumi.Input[_builtins.str]] = None,
138
+ settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
139
+ type: Optional[pulumi.Input[_builtins.str]] = None,
140
+ use_signature: Optional[pulumi.Input[_builtins.bool]] = None,
141
+ username_format: Optional[pulumi.Input[_builtins.str]] = None):
142
+ """
143
+ Input properties used for looking up and filtering MfaPingid resources.
144
+ :param pulumi.Input[_builtins.str] admin_url: `(string)` – Admin URL computed by Vault
145
+ :param pulumi.Input[_builtins.str] authenticator_url: `(string)` – Authenticator URL computed by Vault
146
+ :param pulumi.Input[_builtins.str] idp_url: `(string)` – IDP URL computed by Vault
147
+ :param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
148
+ The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
149
+ :param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
150
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
151
+ The value should not contain leading or trailing forward slashes.
152
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
+ *Available only for Vault Enterprise*.
154
+ :param pulumi.Input[_builtins.str] namespace_id: `(string)` – Namespace ID computed by Vault
155
+ :param pulumi.Input[_builtins.str] org_alias: `(string)` – Org Alias computed by Vault
156
+ :param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
157
+ from PingID's configuration page.
158
+ :param pulumi.Input[_builtins.str] type: `(string)` – Type of configuration computed by Vault
159
+ :param pulumi.Input[_builtins.bool] use_signature: `(string)` – If set to true, enables use of PingID signature. Computed by Vault
160
+ :param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
161
+ Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
162
+ If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
163
+ - alias.name: The name returned by the mount configured via the `mount_accessor` parameter
164
+ - entity.name: The name configured for the Entity
165
+ - alias.metadata.`<key>`: The value of the Alias's metadata parameter
166
+ - entity.metadata.`<key>`: The value of the Entity's metadata parameter
167
+ """
168
+ if admin_url is not None:
169
+ pulumi.set(__self__, "admin_url", admin_url)
170
+ if authenticator_url is not None:
171
+ pulumi.set(__self__, "authenticator_url", authenticator_url)
172
+ if idp_url is not None:
173
+ pulumi.set(__self__, "idp_url", idp_url)
174
+ if mount_accessor is not None:
175
+ pulumi.set(__self__, "mount_accessor", mount_accessor)
176
+ if name is not None:
177
+ pulumi.set(__self__, "name", name)
178
+ if namespace is not None:
179
+ pulumi.set(__self__, "namespace", namespace)
180
+ if namespace_id is not None:
181
+ pulumi.set(__self__, "namespace_id", namespace_id)
182
+ if org_alias is not None:
183
+ pulumi.set(__self__, "org_alias", org_alias)
184
+ if settings_file_base64 is not None:
185
+ pulumi.set(__self__, "settings_file_base64", settings_file_base64)
186
+ if type is not None:
187
+ pulumi.set(__self__, "type", type)
188
+ if use_signature is not None:
189
+ pulumi.set(__self__, "use_signature", use_signature)
190
+ if username_format is not None:
191
+ pulumi.set(__self__, "username_format", username_format)
192
+
193
+ @_builtins.property
194
+ @pulumi.getter(name="adminUrl")
195
+ def admin_url(self) -> Optional[pulumi.Input[_builtins.str]]:
196
+ """
197
+ `(string)` – Admin URL computed by Vault
198
+ """
199
+ return pulumi.get(self, "admin_url")
200
+
201
+ @admin_url.setter
202
+ def admin_url(self, value: Optional[pulumi.Input[_builtins.str]]):
203
+ pulumi.set(self, "admin_url", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="authenticatorUrl")
207
+ def authenticator_url(self) -> Optional[pulumi.Input[_builtins.str]]:
208
+ """
209
+ `(string)` – Authenticator URL computed by Vault
210
+ """
211
+ return pulumi.get(self, "authenticator_url")
212
+
213
+ @authenticator_url.setter
214
+ def authenticator_url(self, value: Optional[pulumi.Input[_builtins.str]]):
215
+ pulumi.set(self, "authenticator_url", value)
216
+
217
+ @_builtins.property
218
+ @pulumi.getter(name="idpUrl")
219
+ def idp_url(self) -> Optional[pulumi.Input[_builtins.str]]:
220
+ """
221
+ `(string)` – IDP URL computed by Vault
222
+ """
223
+ return pulumi.get(self, "idp_url")
224
+
225
+ @idp_url.setter
226
+ def idp_url(self, value: Optional[pulumi.Input[_builtins.str]]):
227
+ pulumi.set(self, "idp_url", value)
228
+
229
+ @_builtins.property
230
+ @pulumi.getter(name="mountAccessor")
231
+ def mount_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
232
+ """
233
+ `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
234
+ The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
235
+ """
236
+ return pulumi.get(self, "mount_accessor")
237
+
238
+ @mount_accessor.setter
239
+ def mount_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
240
+ pulumi.set(self, "mount_accessor", value)
241
+
242
+ @_builtins.property
243
+ @pulumi.getter
244
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
245
+ """
246
+ `(string: <required>)` – Name of the MFA method.
247
+ """
248
+ return pulumi.get(self, "name")
249
+
250
+ @name.setter
251
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
252
+ pulumi.set(self, "name", value)
253
+
254
+ @_builtins.property
255
+ @pulumi.getter
256
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
257
+ """
258
+ The namespace to provision the resource in.
259
+ The value should not contain leading or trailing forward slashes.
260
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
261
+ *Available only for Vault Enterprise*.
262
+ """
263
+ return pulumi.get(self, "namespace")
264
+
265
+ @namespace.setter
266
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
267
+ pulumi.set(self, "namespace", value)
268
+
269
+ @_builtins.property
270
+ @pulumi.getter(name="namespaceId")
271
+ def namespace_id(self) -> Optional[pulumi.Input[_builtins.str]]:
272
+ """
273
+ `(string)` – Namespace ID computed by Vault
274
+ """
275
+ return pulumi.get(self, "namespace_id")
276
+
277
+ @namespace_id.setter
278
+ def namespace_id(self, value: Optional[pulumi.Input[_builtins.str]]):
279
+ pulumi.set(self, "namespace_id", value)
280
+
281
+ @_builtins.property
282
+ @pulumi.getter(name="orgAlias")
283
+ def org_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
284
+ """
285
+ `(string)` – Org Alias computed by Vault
286
+ """
287
+ return pulumi.get(self, "org_alias")
288
+
289
+ @org_alias.setter
290
+ def org_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
291
+ pulumi.set(self, "org_alias", value)
292
+
293
+ @_builtins.property
294
+ @pulumi.getter(name="settingsFileBase64")
295
+ def settings_file_base64(self) -> Optional[pulumi.Input[_builtins.str]]:
296
+ """
297
+ `(string: <required>)` - A base64-encoded third-party settings file retrieved
298
+ from PingID's configuration page.
299
+ """
300
+ return pulumi.get(self, "settings_file_base64")
301
+
302
+ @settings_file_base64.setter
303
+ def settings_file_base64(self, value: Optional[pulumi.Input[_builtins.str]]):
304
+ pulumi.set(self, "settings_file_base64", value)
305
+
306
+ @_builtins.property
307
+ @pulumi.getter
308
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
309
+ """
310
+ `(string)` – Type of configuration computed by Vault
311
+ """
312
+ return pulumi.get(self, "type")
313
+
314
+ @type.setter
315
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
316
+ pulumi.set(self, "type", value)
317
+
318
+ @_builtins.property
319
+ @pulumi.getter(name="useSignature")
320
+ def use_signature(self) -> Optional[pulumi.Input[_builtins.bool]]:
321
+ """
322
+ `(string)` – If set to true, enables use of PingID signature. Computed by Vault
323
+ """
324
+ return pulumi.get(self, "use_signature")
325
+
326
+ @use_signature.setter
327
+ def use_signature(self, value: Optional[pulumi.Input[_builtins.bool]]):
328
+ pulumi.set(self, "use_signature", value)
329
+
330
+ @_builtins.property
331
+ @pulumi.getter(name="usernameFormat")
332
+ def username_format(self) -> Optional[pulumi.Input[_builtins.str]]:
333
+ """
334
+ `(string)` - A format string for mapping Identity names to MFA method names.
335
+ Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
336
+ If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
337
+ - alias.name: The name returned by the mount configured via the `mount_accessor` parameter
338
+ - entity.name: The name configured for the Entity
339
+ - alias.metadata.`<key>`: The value of the Alias's metadata parameter
340
+ - entity.metadata.`<key>`: The value of the Entity's metadata parameter
341
+ """
342
+ return pulumi.get(self, "username_format")
343
+
344
+ @username_format.setter
345
+ def username_format(self, value: Optional[pulumi.Input[_builtins.str]]):
346
+ pulumi.set(self, "username_format", value)
347
+
348
+
349
+ @pulumi.type_token("vault:index/mfaPingid:MfaPingid")
350
+ class MfaPingid(pulumi.CustomResource):
351
+ @overload
352
+ def __init__(__self__,
353
+ resource_name: str,
354
+ opts: Optional[pulumi.ResourceOptions] = None,
355
+ mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
356
+ name: Optional[pulumi.Input[_builtins.str]] = None,
357
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
358
+ settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
359
+ username_format: Optional[pulumi.Input[_builtins.str]] = None,
360
+ __props__=None):
361
+ """
362
+ Provides a resource to manage [PingID MFA](https://www.vaultproject.io/docs/enterprise/mfa/mfa-pingid).
363
+
364
+ **Note** this feature is available only with Vault Enterprise.
365
+
366
+ ## Example Usage
367
+
368
+ ```python
369
+ import pulumi
370
+ import pulumi_vault as vault
371
+
372
+ config = pulumi.Config()
373
+ settings_file = config.require_object("settingsFile")
374
+ userpass = vault.AuthBackend("userpass",
375
+ type="userpass",
376
+ path="userpass")
377
+ my_pingid = vault.MfaPingid("my_pingid",
378
+ name="my_pingid",
379
+ mount_accessor=userpass.accessor,
380
+ username_format="user@example.com",
381
+ settings_file_base64=settings_file)
382
+ ```
383
+
384
+ ## Import
385
+
386
+ Mounts can be imported using the `path`, e.g.
387
+
388
+ ```sh
389
+ $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
390
+ ```
391
+
392
+ :param str resource_name: The name of the resource.
393
+ :param pulumi.ResourceOptions opts: Options for the resource.
394
+ :param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
395
+ The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
396
+ :param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
397
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
398
+ The value should not contain leading or trailing forward slashes.
399
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
400
+ *Available only for Vault Enterprise*.
401
+ :param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
402
+ from PingID's configuration page.
403
+ :param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
404
+ Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
405
+ If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
406
+ - alias.name: The name returned by the mount configured via the `mount_accessor` parameter
407
+ - entity.name: The name configured for the Entity
408
+ - alias.metadata.`<key>`: The value of the Alias's metadata parameter
409
+ - entity.metadata.`<key>`: The value of the Entity's metadata parameter
410
+ """
411
+ ...
412
+ @overload
413
+ def __init__(__self__,
414
+ resource_name: str,
415
+ args: MfaPingidArgs,
416
+ opts: Optional[pulumi.ResourceOptions] = None):
417
+ """
418
+ Provides a resource to manage [PingID MFA](https://www.vaultproject.io/docs/enterprise/mfa/mfa-pingid).
419
+
420
+ **Note** this feature is available only with Vault Enterprise.
421
+
422
+ ## Example Usage
423
+
424
+ ```python
425
+ import pulumi
426
+ import pulumi_vault as vault
427
+
428
+ config = pulumi.Config()
429
+ settings_file = config.require_object("settingsFile")
430
+ userpass = vault.AuthBackend("userpass",
431
+ type="userpass",
432
+ path="userpass")
433
+ my_pingid = vault.MfaPingid("my_pingid",
434
+ name="my_pingid",
435
+ mount_accessor=userpass.accessor,
436
+ username_format="user@example.com",
437
+ settings_file_base64=settings_file)
438
+ ```
439
+
440
+ ## Import
441
+
442
+ Mounts can be imported using the `path`, e.g.
443
+
444
+ ```sh
445
+ $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
446
+ ```
447
+
448
+ :param str resource_name: The name of the resource.
449
+ :param MfaPingidArgs args: The arguments to use to populate this resource's properties.
450
+ :param pulumi.ResourceOptions opts: Options for the resource.
451
+ """
452
+ ...
453
+ def __init__(__self__, resource_name: str, *args, **kwargs):
454
+ resource_args, opts = _utilities.get_resource_args_opts(MfaPingidArgs, pulumi.ResourceOptions, *args, **kwargs)
455
+ if resource_args is not None:
456
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
457
+ else:
458
+ __self__._internal_init(resource_name, *args, **kwargs)
459
+
460
+ def _internal_init(__self__,
461
+ resource_name: str,
462
+ opts: Optional[pulumi.ResourceOptions] = None,
463
+ mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
464
+ name: Optional[pulumi.Input[_builtins.str]] = None,
465
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
466
+ settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
467
+ username_format: Optional[pulumi.Input[_builtins.str]] = None,
468
+ __props__=None):
469
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
470
+ if not isinstance(opts, pulumi.ResourceOptions):
471
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
472
+ if opts.id is None:
473
+ if __props__ is not None:
474
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
475
+ __props__ = MfaPingidArgs.__new__(MfaPingidArgs)
476
+
477
+ if mount_accessor is None and not opts.urn:
478
+ raise TypeError("Missing required property 'mount_accessor'")
479
+ __props__.__dict__["mount_accessor"] = mount_accessor
480
+ __props__.__dict__["name"] = name
481
+ __props__.__dict__["namespace"] = namespace
482
+ if settings_file_base64 is None and not opts.urn:
483
+ raise TypeError("Missing required property 'settings_file_base64'")
484
+ __props__.__dict__["settings_file_base64"] = settings_file_base64
485
+ __props__.__dict__["username_format"] = username_format
486
+ __props__.__dict__["admin_url"] = None
487
+ __props__.__dict__["authenticator_url"] = None
488
+ __props__.__dict__["idp_url"] = None
489
+ __props__.__dict__["namespace_id"] = None
490
+ __props__.__dict__["org_alias"] = None
491
+ __props__.__dict__["type"] = None
492
+ __props__.__dict__["use_signature"] = None
493
+ super(MfaPingid, __self__).__init__(
494
+ 'vault:index/mfaPingid:MfaPingid',
495
+ resource_name,
496
+ __props__,
497
+ opts)
498
+
499
+ @staticmethod
500
+ def get(resource_name: str,
501
+ id: pulumi.Input[str],
502
+ opts: Optional[pulumi.ResourceOptions] = None,
503
+ admin_url: Optional[pulumi.Input[_builtins.str]] = None,
504
+ authenticator_url: Optional[pulumi.Input[_builtins.str]] = None,
505
+ idp_url: Optional[pulumi.Input[_builtins.str]] = None,
506
+ mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
507
+ name: Optional[pulumi.Input[_builtins.str]] = None,
508
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
509
+ namespace_id: Optional[pulumi.Input[_builtins.str]] = None,
510
+ org_alias: Optional[pulumi.Input[_builtins.str]] = None,
511
+ settings_file_base64: Optional[pulumi.Input[_builtins.str]] = None,
512
+ type: Optional[pulumi.Input[_builtins.str]] = None,
513
+ use_signature: Optional[pulumi.Input[_builtins.bool]] = None,
514
+ username_format: Optional[pulumi.Input[_builtins.str]] = None) -> 'MfaPingid':
515
+ """
516
+ Get an existing MfaPingid resource's state with the given name, id, and optional extra
517
+ properties used to qualify the lookup.
518
+
519
+ :param str resource_name: The unique name of the resulting resource.
520
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
521
+ :param pulumi.ResourceOptions opts: Options for the resource.
522
+ :param pulumi.Input[_builtins.str] admin_url: `(string)` – Admin URL computed by Vault
523
+ :param pulumi.Input[_builtins.str] authenticator_url: `(string)` – Authenticator URL computed by Vault
524
+ :param pulumi.Input[_builtins.str] idp_url: `(string)` – IDP URL computed by Vault
525
+ :param pulumi.Input[_builtins.str] mount_accessor: `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
526
+ The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
527
+ :param pulumi.Input[_builtins.str] name: `(string: <required>)` – Name of the MFA method.
528
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
529
+ The value should not contain leading or trailing forward slashes.
530
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
531
+ *Available only for Vault Enterprise*.
532
+ :param pulumi.Input[_builtins.str] namespace_id: `(string)` – Namespace ID computed by Vault
533
+ :param pulumi.Input[_builtins.str] org_alias: `(string)` – Org Alias computed by Vault
534
+ :param pulumi.Input[_builtins.str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
535
+ from PingID's configuration page.
536
+ :param pulumi.Input[_builtins.str] type: `(string)` – Type of configuration computed by Vault
537
+ :param pulumi.Input[_builtins.bool] use_signature: `(string)` – If set to true, enables use of PingID signature. Computed by Vault
538
+ :param pulumi.Input[_builtins.str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
539
+ Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
540
+ If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
541
+ - alias.name: The name returned by the mount configured via the `mount_accessor` parameter
542
+ - entity.name: The name configured for the Entity
543
+ - alias.metadata.`<key>`: The value of the Alias's metadata parameter
544
+ - entity.metadata.`<key>`: The value of the Entity's metadata parameter
545
+ """
546
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
547
+
548
+ __props__ = _MfaPingidState.__new__(_MfaPingidState)
549
+
550
+ __props__.__dict__["admin_url"] = admin_url
551
+ __props__.__dict__["authenticator_url"] = authenticator_url
552
+ __props__.__dict__["idp_url"] = idp_url
553
+ __props__.__dict__["mount_accessor"] = mount_accessor
554
+ __props__.__dict__["name"] = name
555
+ __props__.__dict__["namespace"] = namespace
556
+ __props__.__dict__["namespace_id"] = namespace_id
557
+ __props__.__dict__["org_alias"] = org_alias
558
+ __props__.__dict__["settings_file_base64"] = settings_file_base64
559
+ __props__.__dict__["type"] = type
560
+ __props__.__dict__["use_signature"] = use_signature
561
+ __props__.__dict__["username_format"] = username_format
562
+ return MfaPingid(resource_name, opts=opts, __props__=__props__)
563
+
564
+ @_builtins.property
565
+ @pulumi.getter(name="adminUrl")
566
+ def admin_url(self) -> pulumi.Output[_builtins.str]:
567
+ """
568
+ `(string)` – Admin URL computed by Vault
569
+ """
570
+ return pulumi.get(self, "admin_url")
571
+
572
+ @_builtins.property
573
+ @pulumi.getter(name="authenticatorUrl")
574
+ def authenticator_url(self) -> pulumi.Output[_builtins.str]:
575
+ """
576
+ `(string)` – Authenticator URL computed by Vault
577
+ """
578
+ return pulumi.get(self, "authenticator_url")
579
+
580
+ @_builtins.property
581
+ @pulumi.getter(name="idpUrl")
582
+ def idp_url(self) -> pulumi.Output[_builtins.str]:
583
+ """
584
+ `(string)` – IDP URL computed by Vault
585
+ """
586
+ return pulumi.get(self, "idp_url")
587
+
588
+ @_builtins.property
589
+ @pulumi.getter(name="mountAccessor")
590
+ def mount_accessor(self) -> pulumi.Output[_builtins.str]:
591
+ """
592
+ `(string: <required>)` - The mount to tie this method to for use in automatic mappings.
593
+ The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
594
+ """
595
+ return pulumi.get(self, "mount_accessor")
596
+
597
+ @_builtins.property
598
+ @pulumi.getter
599
+ def name(self) -> pulumi.Output[_builtins.str]:
600
+ """
601
+ `(string: <required>)` – Name of the MFA method.
602
+ """
603
+ return pulumi.get(self, "name")
604
+
605
+ @_builtins.property
606
+ @pulumi.getter
607
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
608
+ """
609
+ The namespace to provision the resource in.
610
+ The value should not contain leading or trailing forward slashes.
611
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
612
+ *Available only for Vault Enterprise*.
613
+ """
614
+ return pulumi.get(self, "namespace")
615
+
616
+ @_builtins.property
617
+ @pulumi.getter(name="namespaceId")
618
+ def namespace_id(self) -> pulumi.Output[_builtins.str]:
619
+ """
620
+ `(string)` – Namespace ID computed by Vault
621
+ """
622
+ return pulumi.get(self, "namespace_id")
623
+
624
+ @_builtins.property
625
+ @pulumi.getter(name="orgAlias")
626
+ def org_alias(self) -> pulumi.Output[_builtins.str]:
627
+ """
628
+ `(string)` – Org Alias computed by Vault
629
+ """
630
+ return pulumi.get(self, "org_alias")
631
+
632
+ @_builtins.property
633
+ @pulumi.getter(name="settingsFileBase64")
634
+ def settings_file_base64(self) -> pulumi.Output[_builtins.str]:
635
+ """
636
+ `(string: <required>)` - A base64-encoded third-party settings file retrieved
637
+ from PingID's configuration page.
638
+ """
639
+ return pulumi.get(self, "settings_file_base64")
640
+
641
+ @_builtins.property
642
+ @pulumi.getter
643
+ def type(self) -> pulumi.Output[_builtins.str]:
644
+ """
645
+ `(string)` – Type of configuration computed by Vault
646
+ """
647
+ return pulumi.get(self, "type")
648
+
649
+ @_builtins.property
650
+ @pulumi.getter(name="useSignature")
651
+ def use_signature(self) -> pulumi.Output[_builtins.bool]:
652
+ """
653
+ `(string)` – If set to true, enables use of PingID signature. Computed by Vault
654
+ """
655
+ return pulumi.get(self, "use_signature")
656
+
657
+ @_builtins.property
658
+ @pulumi.getter(name="usernameFormat")
659
+ def username_format(self) -> pulumi.Output[Optional[_builtins.str]]:
660
+ """
661
+ `(string)` - A format string for mapping Identity names to MFA method names.
662
+ Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
663
+ If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
664
+ - alias.name: The name returned by the mount configured via the `mount_accessor` parameter
665
+ - entity.name: The name configured for the Entity
666
+ - alias.metadata.`<key>`: The value of the Alias's metadata parameter
667
+ - entity.metadata.`<key>`: The value of the Entity's metadata parameter
668
+ """
669
+ return pulumi.get(self, "username_format")
670
+