pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1231 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['AuthBackendArgs', 'AuthBackend']
20
+
21
+ @pulumi.input_type
22
+ class AuthBackendArgs:
23
+ def __init__(__self__, *,
24
+ organization: pulumi.Input[_builtins.str],
25
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
26
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
27
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ description: Optional[pulumi.Input[_builtins.str]] = None,
29
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
32
+ path: Optional[pulumi.Input[_builtins.str]] = None,
33
+ token: Optional[pulumi.Input[_builtins.str]] = None,
34
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
35
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
39
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
40
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
41
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
42
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
43
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
44
+ users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
45
+ """
46
+ The set of arguments for constructing a AuthBackend resource.
47
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
48
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
49
+ This should be a list or map containing the metadata in key value pairs.
50
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
51
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
52
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
53
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
54
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
55
+ :param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
56
+ See below for more details.
57
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
58
+ The value should not contain leading or trailing forward slashes.
59
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
60
+ *Available only for Vault Enterprise*.
61
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
62
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
63
+ If this is not supplied only locally configured groups will be enabled.
64
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
65
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
66
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
67
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
68
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
69
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
70
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
71
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
72
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
73
+ :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
74
+ See below for more details.
75
+ """
76
+ pulumi.set(__self__, "organization", organization)
77
+ if alias_metadata is not None:
78
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
79
+ if base_url is not None:
80
+ pulumi.set(__self__, "base_url", base_url)
81
+ if bypass_okta_mfa is not None:
82
+ pulumi.set(__self__, "bypass_okta_mfa", bypass_okta_mfa)
83
+ if description is not None:
84
+ pulumi.set(__self__, "description", description)
85
+ if disable_remount is not None:
86
+ pulumi.set(__self__, "disable_remount", disable_remount)
87
+ if groups is not None:
88
+ pulumi.set(__self__, "groups", groups)
89
+ if namespace is not None:
90
+ pulumi.set(__self__, "namespace", namespace)
91
+ if path is not None:
92
+ pulumi.set(__self__, "path", path)
93
+ if token is not None:
94
+ pulumi.set(__self__, "token", token)
95
+ if token_bound_cidrs is not None:
96
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
97
+ if token_explicit_max_ttl is not None:
98
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
99
+ if token_max_ttl is not None:
100
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
101
+ if token_no_default_policy is not None:
102
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
103
+ if token_num_uses is not None:
104
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
105
+ if token_period is not None:
106
+ pulumi.set(__self__, "token_period", token_period)
107
+ if token_policies is not None:
108
+ pulumi.set(__self__, "token_policies", token_policies)
109
+ if token_ttl is not None:
110
+ pulumi.set(__self__, "token_ttl", token_ttl)
111
+ if token_type is not None:
112
+ pulumi.set(__self__, "token_type", token_type)
113
+ if tune is not None:
114
+ pulumi.set(__self__, "tune", tune)
115
+ if users is not None:
116
+ pulumi.set(__self__, "users", users)
117
+
118
+ @_builtins.property
119
+ @pulumi.getter
120
+ def organization(self) -> pulumi.Input[_builtins.str]:
121
+ """
122
+ The Okta organization. This will be the first part of the url `https://XXX.okta.com`
123
+ """
124
+ return pulumi.get(self, "organization")
125
+
126
+ @organization.setter
127
+ def organization(self, value: pulumi.Input[_builtins.str]):
128
+ pulumi.set(self, "organization", value)
129
+
130
+ @_builtins.property
131
+ @pulumi.getter(name="aliasMetadata")
132
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
133
+ """
134
+ The metadata to be tied to generated entity alias.
135
+ This should be a list or map containing the metadata in key value pairs.
136
+ """
137
+ return pulumi.get(self, "alias_metadata")
138
+
139
+ @alias_metadata.setter
140
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
141
+ pulumi.set(self, "alias_metadata", value)
142
+
143
+ @_builtins.property
144
+ @pulumi.getter(name="baseUrl")
145
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
146
+ """
147
+ The Okta url. Examples: oktapreview.com, okta.com
148
+ """
149
+ return pulumi.get(self, "base_url")
150
+
151
+ @base_url.setter
152
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
153
+ pulumi.set(self, "base_url", value)
154
+
155
+ @_builtins.property
156
+ @pulumi.getter(name="bypassOktaMfa")
157
+ def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
158
+ """
159
+ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
160
+ """
161
+ return pulumi.get(self, "bypass_okta_mfa")
162
+
163
+ @bypass_okta_mfa.setter
164
+ def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
165
+ pulumi.set(self, "bypass_okta_mfa", value)
166
+
167
+ @_builtins.property
168
+ @pulumi.getter
169
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
170
+ """
171
+ The description of the auth backend
172
+ """
173
+ return pulumi.get(self, "description")
174
+
175
+ @description.setter
176
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
177
+ pulumi.set(self, "description", value)
178
+
179
+ @_builtins.property
180
+ @pulumi.getter(name="disableRemount")
181
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
182
+ """
183
+ If set, opts out of mount migration on path updates.
184
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
185
+ """
186
+ return pulumi.get(self, "disable_remount")
187
+
188
+ @disable_remount.setter
189
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
190
+ pulumi.set(self, "disable_remount", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter
194
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
195
+ """
196
+ Associate Okta groups with policies within Vault.
197
+ See below for more details.
198
+ """
199
+ return pulumi.get(self, "groups")
200
+
201
+ @groups.setter
202
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
203
+ pulumi.set(self, "groups", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter
207
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
208
+ """
209
+ The namespace to provision the resource in.
210
+ The value should not contain leading or trailing forward slashes.
211
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
212
+ *Available only for Vault Enterprise*.
213
+ """
214
+ return pulumi.get(self, "namespace")
215
+
216
+ @namespace.setter
217
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
218
+ pulumi.set(self, "namespace", value)
219
+
220
+ @_builtins.property
221
+ @pulumi.getter
222
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
223
+ """
224
+ Path to mount the Okta auth backend. Default to path `okta`.
225
+ """
226
+ return pulumi.get(self, "path")
227
+
228
+ @path.setter
229
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
230
+ pulumi.set(self, "path", value)
231
+
232
+ @_builtins.property
233
+ @pulumi.getter
234
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
235
+ """
236
+ The Okta API token. This is required to query Okta for user group membership.
237
+ If this is not supplied only locally configured groups will be enabled.
238
+ """
239
+ return pulumi.get(self, "token")
240
+
241
+ @token.setter
242
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
243
+ pulumi.set(self, "token", value)
244
+
245
+ @_builtins.property
246
+ @pulumi.getter(name="tokenBoundCidrs")
247
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
248
+ """
249
+ Specifies the blocks of IP addresses which are allowed to use the generated token
250
+ """
251
+ return pulumi.get(self, "token_bound_cidrs")
252
+
253
+ @token_bound_cidrs.setter
254
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
255
+ pulumi.set(self, "token_bound_cidrs", value)
256
+
257
+ @_builtins.property
258
+ @pulumi.getter(name="tokenExplicitMaxTtl")
259
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
260
+ """
261
+ Generated Token's Explicit Maximum TTL in seconds
262
+ """
263
+ return pulumi.get(self, "token_explicit_max_ttl")
264
+
265
+ @token_explicit_max_ttl.setter
266
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
267
+ pulumi.set(self, "token_explicit_max_ttl", value)
268
+
269
+ @_builtins.property
270
+ @pulumi.getter(name="tokenMaxTtl")
271
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
272
+ """
273
+ The maximum lifetime of the generated token
274
+ """
275
+ return pulumi.get(self, "token_max_ttl")
276
+
277
+ @token_max_ttl.setter
278
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
279
+ pulumi.set(self, "token_max_ttl", value)
280
+
281
+ @_builtins.property
282
+ @pulumi.getter(name="tokenNoDefaultPolicy")
283
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
284
+ """
285
+ If true, the 'default' policy will not automatically be added to generated tokens
286
+ """
287
+ return pulumi.get(self, "token_no_default_policy")
288
+
289
+ @token_no_default_policy.setter
290
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
291
+ pulumi.set(self, "token_no_default_policy", value)
292
+
293
+ @_builtins.property
294
+ @pulumi.getter(name="tokenNumUses")
295
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
296
+ """
297
+ The maximum number of times a token may be used, a value of zero means unlimited
298
+ """
299
+ return pulumi.get(self, "token_num_uses")
300
+
301
+ @token_num_uses.setter
302
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
303
+ pulumi.set(self, "token_num_uses", value)
304
+
305
+ @_builtins.property
306
+ @pulumi.getter(name="tokenPeriod")
307
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
308
+ """
309
+ Generated Token's Period
310
+ """
311
+ return pulumi.get(self, "token_period")
312
+
313
+ @token_period.setter
314
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
315
+ pulumi.set(self, "token_period", value)
316
+
317
+ @_builtins.property
318
+ @pulumi.getter(name="tokenPolicies")
319
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
320
+ """
321
+ Generated Token's Policies
322
+ """
323
+ return pulumi.get(self, "token_policies")
324
+
325
+ @token_policies.setter
326
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
327
+ pulumi.set(self, "token_policies", value)
328
+
329
+ @_builtins.property
330
+ @pulumi.getter(name="tokenTtl")
331
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
332
+ """
333
+ The initial ttl of the token to generate in seconds
334
+ """
335
+ return pulumi.get(self, "token_ttl")
336
+
337
+ @token_ttl.setter
338
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
339
+ pulumi.set(self, "token_ttl", value)
340
+
341
+ @_builtins.property
342
+ @pulumi.getter(name="tokenType")
343
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
344
+ """
345
+ The type of token to generate, service or batch
346
+ """
347
+ return pulumi.get(self, "token_type")
348
+
349
+ @token_type.setter
350
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
351
+ pulumi.set(self, "token_type", value)
352
+
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
356
+ return pulumi.get(self, "tune")
357
+
358
+ @tune.setter
359
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
360
+ pulumi.set(self, "tune", value)
361
+
362
+ @_builtins.property
363
+ @pulumi.getter
364
+ def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
365
+ """
366
+ Associate Okta users with groups or policies within Vault.
367
+ See below for more details.
368
+ """
369
+ return pulumi.get(self, "users")
370
+
371
+ @users.setter
372
+ def users(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]):
373
+ pulumi.set(self, "users", value)
374
+
375
+
376
+ @pulumi.input_type
377
+ class _AuthBackendState:
378
+ def __init__(__self__, *,
379
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
380
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
381
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
382
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
383
+ description: Optional[pulumi.Input[_builtins.str]] = None,
384
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
385
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
386
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
387
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
388
+ path: Optional[pulumi.Input[_builtins.str]] = None,
389
+ token: Optional[pulumi.Input[_builtins.str]] = None,
390
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
391
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
392
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
393
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
394
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
395
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
396
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
397
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
398
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
399
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
400
+ users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
401
+ """
402
+ Input properties used for looking up and filtering AuthBackend resources.
403
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
404
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
405
+ This should be a list or map containing the metadata in key value pairs.
406
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
407
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
408
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
409
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
410
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
411
+ :param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
412
+ See below for more details.
413
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
414
+ The value should not contain leading or trailing forward slashes.
415
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
416
+ *Available only for Vault Enterprise*.
417
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
418
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
419
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
420
+ If this is not supplied only locally configured groups will be enabled.
421
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
422
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
423
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
424
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
425
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
426
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
427
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
428
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
429
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
430
+ :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
431
+ See below for more details.
432
+ """
433
+ if accessor is not None:
434
+ pulumi.set(__self__, "accessor", accessor)
435
+ if alias_metadata is not None:
436
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
437
+ if base_url is not None:
438
+ pulumi.set(__self__, "base_url", base_url)
439
+ if bypass_okta_mfa is not None:
440
+ pulumi.set(__self__, "bypass_okta_mfa", bypass_okta_mfa)
441
+ if description is not None:
442
+ pulumi.set(__self__, "description", description)
443
+ if disable_remount is not None:
444
+ pulumi.set(__self__, "disable_remount", disable_remount)
445
+ if groups is not None:
446
+ pulumi.set(__self__, "groups", groups)
447
+ if namespace is not None:
448
+ pulumi.set(__self__, "namespace", namespace)
449
+ if organization is not None:
450
+ pulumi.set(__self__, "organization", organization)
451
+ if path is not None:
452
+ pulumi.set(__self__, "path", path)
453
+ if token is not None:
454
+ pulumi.set(__self__, "token", token)
455
+ if token_bound_cidrs is not None:
456
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
457
+ if token_explicit_max_ttl is not None:
458
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
459
+ if token_max_ttl is not None:
460
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
461
+ if token_no_default_policy is not None:
462
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
463
+ if token_num_uses is not None:
464
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
465
+ if token_period is not None:
466
+ pulumi.set(__self__, "token_period", token_period)
467
+ if token_policies is not None:
468
+ pulumi.set(__self__, "token_policies", token_policies)
469
+ if token_ttl is not None:
470
+ pulumi.set(__self__, "token_ttl", token_ttl)
471
+ if token_type is not None:
472
+ pulumi.set(__self__, "token_type", token_type)
473
+ if tune is not None:
474
+ pulumi.set(__self__, "tune", tune)
475
+ if users is not None:
476
+ pulumi.set(__self__, "users", users)
477
+
478
+ @_builtins.property
479
+ @pulumi.getter
480
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
481
+ """
482
+ The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
483
+ """
484
+ return pulumi.get(self, "accessor")
485
+
486
+ @accessor.setter
487
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
488
+ pulumi.set(self, "accessor", value)
489
+
490
+ @_builtins.property
491
+ @pulumi.getter(name="aliasMetadata")
492
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
493
+ """
494
+ The metadata to be tied to generated entity alias.
495
+ This should be a list or map containing the metadata in key value pairs.
496
+ """
497
+ return pulumi.get(self, "alias_metadata")
498
+
499
+ @alias_metadata.setter
500
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
501
+ pulumi.set(self, "alias_metadata", value)
502
+
503
+ @_builtins.property
504
+ @pulumi.getter(name="baseUrl")
505
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
506
+ """
507
+ The Okta url. Examples: oktapreview.com, okta.com
508
+ """
509
+ return pulumi.get(self, "base_url")
510
+
511
+ @base_url.setter
512
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
513
+ pulumi.set(self, "base_url", value)
514
+
515
+ @_builtins.property
516
+ @pulumi.getter(name="bypassOktaMfa")
517
+ def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
518
+ """
519
+ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
520
+ """
521
+ return pulumi.get(self, "bypass_okta_mfa")
522
+
523
+ @bypass_okta_mfa.setter
524
+ def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
525
+ pulumi.set(self, "bypass_okta_mfa", value)
526
+
527
+ @_builtins.property
528
+ @pulumi.getter
529
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
530
+ """
531
+ The description of the auth backend
532
+ """
533
+ return pulumi.get(self, "description")
534
+
535
+ @description.setter
536
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
537
+ pulumi.set(self, "description", value)
538
+
539
+ @_builtins.property
540
+ @pulumi.getter(name="disableRemount")
541
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
542
+ """
543
+ If set, opts out of mount migration on path updates.
544
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
545
+ """
546
+ return pulumi.get(self, "disable_remount")
547
+
548
+ @disable_remount.setter
549
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
550
+ pulumi.set(self, "disable_remount", value)
551
+
552
+ @_builtins.property
553
+ @pulumi.getter
554
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
555
+ """
556
+ Associate Okta groups with policies within Vault.
557
+ See below for more details.
558
+ """
559
+ return pulumi.get(self, "groups")
560
+
561
+ @groups.setter
562
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
563
+ pulumi.set(self, "groups", value)
564
+
565
+ @_builtins.property
566
+ @pulumi.getter
567
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
568
+ """
569
+ The namespace to provision the resource in.
570
+ The value should not contain leading or trailing forward slashes.
571
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
572
+ *Available only for Vault Enterprise*.
573
+ """
574
+ return pulumi.get(self, "namespace")
575
+
576
+ @namespace.setter
577
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
578
+ pulumi.set(self, "namespace", value)
579
+
580
+ @_builtins.property
581
+ @pulumi.getter
582
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
583
+ """
584
+ The Okta organization. This will be the first part of the url `https://XXX.okta.com`
585
+ """
586
+ return pulumi.get(self, "organization")
587
+
588
+ @organization.setter
589
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
590
+ pulumi.set(self, "organization", value)
591
+
592
+ @_builtins.property
593
+ @pulumi.getter
594
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
595
+ """
596
+ Path to mount the Okta auth backend. Default to path `okta`.
597
+ """
598
+ return pulumi.get(self, "path")
599
+
600
+ @path.setter
601
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
602
+ pulumi.set(self, "path", value)
603
+
604
+ @_builtins.property
605
+ @pulumi.getter
606
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
607
+ """
608
+ The Okta API token. This is required to query Okta for user group membership.
609
+ If this is not supplied only locally configured groups will be enabled.
610
+ """
611
+ return pulumi.get(self, "token")
612
+
613
+ @token.setter
614
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
615
+ pulumi.set(self, "token", value)
616
+
617
+ @_builtins.property
618
+ @pulumi.getter(name="tokenBoundCidrs")
619
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
620
+ """
621
+ Specifies the blocks of IP addresses which are allowed to use the generated token
622
+ """
623
+ return pulumi.get(self, "token_bound_cidrs")
624
+
625
+ @token_bound_cidrs.setter
626
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
627
+ pulumi.set(self, "token_bound_cidrs", value)
628
+
629
+ @_builtins.property
630
+ @pulumi.getter(name="tokenExplicitMaxTtl")
631
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
632
+ """
633
+ Generated Token's Explicit Maximum TTL in seconds
634
+ """
635
+ return pulumi.get(self, "token_explicit_max_ttl")
636
+
637
+ @token_explicit_max_ttl.setter
638
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
639
+ pulumi.set(self, "token_explicit_max_ttl", value)
640
+
641
+ @_builtins.property
642
+ @pulumi.getter(name="tokenMaxTtl")
643
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
644
+ """
645
+ The maximum lifetime of the generated token
646
+ """
647
+ return pulumi.get(self, "token_max_ttl")
648
+
649
+ @token_max_ttl.setter
650
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
651
+ pulumi.set(self, "token_max_ttl", value)
652
+
653
+ @_builtins.property
654
+ @pulumi.getter(name="tokenNoDefaultPolicy")
655
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
656
+ """
657
+ If true, the 'default' policy will not automatically be added to generated tokens
658
+ """
659
+ return pulumi.get(self, "token_no_default_policy")
660
+
661
+ @token_no_default_policy.setter
662
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
663
+ pulumi.set(self, "token_no_default_policy", value)
664
+
665
+ @_builtins.property
666
+ @pulumi.getter(name="tokenNumUses")
667
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
668
+ """
669
+ The maximum number of times a token may be used, a value of zero means unlimited
670
+ """
671
+ return pulumi.get(self, "token_num_uses")
672
+
673
+ @token_num_uses.setter
674
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
675
+ pulumi.set(self, "token_num_uses", value)
676
+
677
+ @_builtins.property
678
+ @pulumi.getter(name="tokenPeriod")
679
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
680
+ """
681
+ Generated Token's Period
682
+ """
683
+ return pulumi.get(self, "token_period")
684
+
685
+ @token_period.setter
686
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
687
+ pulumi.set(self, "token_period", value)
688
+
689
+ @_builtins.property
690
+ @pulumi.getter(name="tokenPolicies")
691
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
692
+ """
693
+ Generated Token's Policies
694
+ """
695
+ return pulumi.get(self, "token_policies")
696
+
697
+ @token_policies.setter
698
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
699
+ pulumi.set(self, "token_policies", value)
700
+
701
+ @_builtins.property
702
+ @pulumi.getter(name="tokenTtl")
703
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
704
+ """
705
+ The initial ttl of the token to generate in seconds
706
+ """
707
+ return pulumi.get(self, "token_ttl")
708
+
709
+ @token_ttl.setter
710
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
711
+ pulumi.set(self, "token_ttl", value)
712
+
713
+ @_builtins.property
714
+ @pulumi.getter(name="tokenType")
715
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
716
+ """
717
+ The type of token to generate, service or batch
718
+ """
719
+ return pulumi.get(self, "token_type")
720
+
721
+ @token_type.setter
722
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
723
+ pulumi.set(self, "token_type", value)
724
+
725
+ @_builtins.property
726
+ @pulumi.getter
727
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
728
+ return pulumi.get(self, "tune")
729
+
730
+ @tune.setter
731
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
732
+ pulumi.set(self, "tune", value)
733
+
734
+ @_builtins.property
735
+ @pulumi.getter
736
+ def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
737
+ """
738
+ Associate Okta users with groups or policies within Vault.
739
+ See below for more details.
740
+ """
741
+ return pulumi.get(self, "users")
742
+
743
+ @users.setter
744
+ def users(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]):
745
+ pulumi.set(self, "users", value)
746
+
747
+
748
+ @pulumi.type_token("vault:okta/authBackend:AuthBackend")
749
+ class AuthBackend(pulumi.CustomResource):
750
+ @overload
751
+ def __init__(__self__,
752
+ resource_name: str,
753
+ opts: Optional[pulumi.ResourceOptions] = None,
754
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
755
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
756
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
757
+ description: Optional[pulumi.Input[_builtins.str]] = None,
758
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
759
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
760
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
761
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
762
+ path: Optional[pulumi.Input[_builtins.str]] = None,
763
+ token: Optional[pulumi.Input[_builtins.str]] = None,
764
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
765
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
766
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
767
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
768
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
769
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
770
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
771
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
772
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
773
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
774
+ users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
775
+ __props__=None):
776
+ """
777
+ Provides a resource for managing an
778
+ [Okta auth backend within Vault](https://www.vaultproject.io/docs/auth/okta.html).
779
+
780
+ ## Example Usage
781
+
782
+ ```python
783
+ import pulumi
784
+ import pulumi_vault as vault
785
+
786
+ example = vault.okta.AuthBackend("example",
787
+ description="Demonstration of the Terraform Okta auth backend",
788
+ organization="example",
789
+ token="something that should be kept secret",
790
+ groups=[{
791
+ "group_name": "foo",
792
+ "policies": [
793
+ "one",
794
+ "two",
795
+ ],
796
+ }],
797
+ users=[{
798
+ "username": "bar",
799
+ "groups": ["foo"],
800
+ }])
801
+ ```
802
+
803
+ ## Import
804
+
805
+ Okta authentication backends can be imported using its `path`, e.g.
806
+
807
+ ```sh
808
+ $ pulumi import vault:okta/authBackend:AuthBackend example okta
809
+ ```
810
+
811
+ :param str resource_name: The name of the resource.
812
+ :param pulumi.ResourceOptions opts: Options for the resource.
813
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
814
+ This should be a list or map containing the metadata in key value pairs.
815
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
816
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
817
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
818
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
819
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
820
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
821
+ See below for more details.
822
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
823
+ The value should not contain leading or trailing forward slashes.
824
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
825
+ *Available only for Vault Enterprise*.
826
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
827
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
828
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
829
+ If this is not supplied only locally configured groups will be enabled.
830
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
831
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
832
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
833
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
834
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
835
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
836
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
837
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
838
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
839
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
840
+ See below for more details.
841
+ """
842
+ ...
843
+ @overload
844
+ def __init__(__self__,
845
+ resource_name: str,
846
+ args: AuthBackendArgs,
847
+ opts: Optional[pulumi.ResourceOptions] = None):
848
+ """
849
+ Provides a resource for managing an
850
+ [Okta auth backend within Vault](https://www.vaultproject.io/docs/auth/okta.html).
851
+
852
+ ## Example Usage
853
+
854
+ ```python
855
+ import pulumi
856
+ import pulumi_vault as vault
857
+
858
+ example = vault.okta.AuthBackend("example",
859
+ description="Demonstration of the Terraform Okta auth backend",
860
+ organization="example",
861
+ token="something that should be kept secret",
862
+ groups=[{
863
+ "group_name": "foo",
864
+ "policies": [
865
+ "one",
866
+ "two",
867
+ ],
868
+ }],
869
+ users=[{
870
+ "username": "bar",
871
+ "groups": ["foo"],
872
+ }])
873
+ ```
874
+
875
+ ## Import
876
+
877
+ Okta authentication backends can be imported using its `path`, e.g.
878
+
879
+ ```sh
880
+ $ pulumi import vault:okta/authBackend:AuthBackend example okta
881
+ ```
882
+
883
+ :param str resource_name: The name of the resource.
884
+ :param AuthBackendArgs args: The arguments to use to populate this resource's properties.
885
+ :param pulumi.ResourceOptions opts: Options for the resource.
886
+ """
887
+ ...
888
+ def __init__(__self__, resource_name: str, *args, **kwargs):
889
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
890
+ if resource_args is not None:
891
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
892
+ else:
893
+ __self__._internal_init(resource_name, *args, **kwargs)
894
+
895
+ def _internal_init(__self__,
896
+ resource_name: str,
897
+ opts: Optional[pulumi.ResourceOptions] = None,
898
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
899
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
900
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
901
+ description: Optional[pulumi.Input[_builtins.str]] = None,
902
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
903
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
904
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
905
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
906
+ path: Optional[pulumi.Input[_builtins.str]] = None,
907
+ token: Optional[pulumi.Input[_builtins.str]] = None,
908
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
909
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
910
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
911
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
912
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
913
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
914
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
915
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
916
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
917
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
918
+ users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
919
+ __props__=None):
920
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
921
+ if not isinstance(opts, pulumi.ResourceOptions):
922
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
923
+ if opts.id is None:
924
+ if __props__ is not None:
925
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
926
+ __props__ = AuthBackendArgs.__new__(AuthBackendArgs)
927
+
928
+ __props__.__dict__["alias_metadata"] = alias_metadata
929
+ __props__.__dict__["base_url"] = base_url
930
+ __props__.__dict__["bypass_okta_mfa"] = bypass_okta_mfa
931
+ __props__.__dict__["description"] = description
932
+ __props__.__dict__["disable_remount"] = disable_remount
933
+ __props__.__dict__["groups"] = groups
934
+ __props__.__dict__["namespace"] = namespace
935
+ if organization is None and not opts.urn:
936
+ raise TypeError("Missing required property 'organization'")
937
+ __props__.__dict__["organization"] = organization
938
+ __props__.__dict__["path"] = path
939
+ __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
940
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
941
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
942
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
943
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
944
+ __props__.__dict__["token_num_uses"] = token_num_uses
945
+ __props__.__dict__["token_period"] = token_period
946
+ __props__.__dict__["token_policies"] = token_policies
947
+ __props__.__dict__["token_ttl"] = token_ttl
948
+ __props__.__dict__["token_type"] = token_type
949
+ __props__.__dict__["tune"] = tune
950
+ __props__.__dict__["users"] = users
951
+ __props__.__dict__["accessor"] = None
952
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["token"])
953
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
954
+ super(AuthBackend, __self__).__init__(
955
+ 'vault:okta/authBackend:AuthBackend',
956
+ resource_name,
957
+ __props__,
958
+ opts)
959
+
960
+ @staticmethod
961
+ def get(resource_name: str,
962
+ id: pulumi.Input[str],
963
+ opts: Optional[pulumi.ResourceOptions] = None,
964
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
965
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
966
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
967
+ bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
968
+ description: Optional[pulumi.Input[_builtins.str]] = None,
969
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
970
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
971
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
972
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
973
+ path: Optional[pulumi.Input[_builtins.str]] = None,
974
+ token: Optional[pulumi.Input[_builtins.str]] = None,
975
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
976
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
977
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
978
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
979
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
980
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
981
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
982
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
983
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
984
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
985
+ users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
986
+ """
987
+ Get an existing AuthBackend resource's state with the given name, id, and optional extra
988
+ properties used to qualify the lookup.
989
+
990
+ :param str resource_name: The unique name of the resulting resource.
991
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
992
+ :param pulumi.ResourceOptions opts: Options for the resource.
993
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
994
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
995
+ This should be a list or map containing the metadata in key value pairs.
996
+ :param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
997
+ :param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
998
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
999
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1000
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1001
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
1002
+ See below for more details.
1003
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1004
+ The value should not contain leading or trailing forward slashes.
1005
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1006
+ *Available only for Vault Enterprise*.
1007
+ :param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
1008
+ :param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
1009
+ :param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
1010
+ If this is not supplied only locally configured groups will be enabled.
1011
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1012
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1013
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
1014
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1015
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1016
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
1017
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
1018
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1019
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
1020
+ :param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
1021
+ See below for more details.
1022
+ """
1023
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1024
+
1025
+ __props__ = _AuthBackendState.__new__(_AuthBackendState)
1026
+
1027
+ __props__.__dict__["accessor"] = accessor
1028
+ __props__.__dict__["alias_metadata"] = alias_metadata
1029
+ __props__.__dict__["base_url"] = base_url
1030
+ __props__.__dict__["bypass_okta_mfa"] = bypass_okta_mfa
1031
+ __props__.__dict__["description"] = description
1032
+ __props__.__dict__["disable_remount"] = disable_remount
1033
+ __props__.__dict__["groups"] = groups
1034
+ __props__.__dict__["namespace"] = namespace
1035
+ __props__.__dict__["organization"] = organization
1036
+ __props__.__dict__["path"] = path
1037
+ __props__.__dict__["token"] = token
1038
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
1039
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
1040
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
1041
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
1042
+ __props__.__dict__["token_num_uses"] = token_num_uses
1043
+ __props__.__dict__["token_period"] = token_period
1044
+ __props__.__dict__["token_policies"] = token_policies
1045
+ __props__.__dict__["token_ttl"] = token_ttl
1046
+ __props__.__dict__["token_type"] = token_type
1047
+ __props__.__dict__["tune"] = tune
1048
+ __props__.__dict__["users"] = users
1049
+ return AuthBackend(resource_name, opts=opts, __props__=__props__)
1050
+
1051
+ @_builtins.property
1052
+ @pulumi.getter
1053
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1054
+ """
1055
+ The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
1056
+ """
1057
+ return pulumi.get(self, "accessor")
1058
+
1059
+ @_builtins.property
1060
+ @pulumi.getter(name="aliasMetadata")
1061
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1062
+ """
1063
+ The metadata to be tied to generated entity alias.
1064
+ This should be a list or map containing the metadata in key value pairs.
1065
+ """
1066
+ return pulumi.get(self, "alias_metadata")
1067
+
1068
+ @_builtins.property
1069
+ @pulumi.getter(name="baseUrl")
1070
+ def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
1071
+ """
1072
+ The Okta url. Examples: oktapreview.com, okta.com
1073
+ """
1074
+ return pulumi.get(self, "base_url")
1075
+
1076
+ @_builtins.property
1077
+ @pulumi.getter(name="bypassOktaMfa")
1078
+ def bypass_okta_mfa(self) -> pulumi.Output[Optional[_builtins.bool]]:
1079
+ """
1080
+ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
1081
+ """
1082
+ return pulumi.get(self, "bypass_okta_mfa")
1083
+
1084
+ @_builtins.property
1085
+ @pulumi.getter
1086
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1087
+ """
1088
+ The description of the auth backend
1089
+ """
1090
+ return pulumi.get(self, "description")
1091
+
1092
+ @_builtins.property
1093
+ @pulumi.getter(name="disableRemount")
1094
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1095
+ """
1096
+ If set, opts out of mount migration on path updates.
1097
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1098
+ """
1099
+ return pulumi.get(self, "disable_remount")
1100
+
1101
+ @_builtins.property
1102
+ @pulumi.getter
1103
+ def groups(self) -> pulumi.Output[Sequence['outputs.AuthBackendGroup']]:
1104
+ """
1105
+ Associate Okta groups with policies within Vault.
1106
+ See below for more details.
1107
+ """
1108
+ return pulumi.get(self, "groups")
1109
+
1110
+ @_builtins.property
1111
+ @pulumi.getter
1112
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1113
+ """
1114
+ The namespace to provision the resource in.
1115
+ The value should not contain leading or trailing forward slashes.
1116
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1117
+ *Available only for Vault Enterprise*.
1118
+ """
1119
+ return pulumi.get(self, "namespace")
1120
+
1121
+ @_builtins.property
1122
+ @pulumi.getter
1123
+ def organization(self) -> pulumi.Output[_builtins.str]:
1124
+ """
1125
+ The Okta organization. This will be the first part of the url `https://XXX.okta.com`
1126
+ """
1127
+ return pulumi.get(self, "organization")
1128
+
1129
+ @_builtins.property
1130
+ @pulumi.getter
1131
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1132
+ """
1133
+ Path to mount the Okta auth backend. Default to path `okta`.
1134
+ """
1135
+ return pulumi.get(self, "path")
1136
+
1137
+ @_builtins.property
1138
+ @pulumi.getter
1139
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
1140
+ """
1141
+ The Okta API token. This is required to query Okta for user group membership.
1142
+ If this is not supplied only locally configured groups will be enabled.
1143
+ """
1144
+ return pulumi.get(self, "token")
1145
+
1146
+ @_builtins.property
1147
+ @pulumi.getter(name="tokenBoundCidrs")
1148
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1149
+ """
1150
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1151
+ """
1152
+ return pulumi.get(self, "token_bound_cidrs")
1153
+
1154
+ @_builtins.property
1155
+ @pulumi.getter(name="tokenExplicitMaxTtl")
1156
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1157
+ """
1158
+ Generated Token's Explicit Maximum TTL in seconds
1159
+ """
1160
+ return pulumi.get(self, "token_explicit_max_ttl")
1161
+
1162
+ @_builtins.property
1163
+ @pulumi.getter(name="tokenMaxTtl")
1164
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1165
+ """
1166
+ The maximum lifetime of the generated token
1167
+ """
1168
+ return pulumi.get(self, "token_max_ttl")
1169
+
1170
+ @_builtins.property
1171
+ @pulumi.getter(name="tokenNoDefaultPolicy")
1172
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1173
+ """
1174
+ If true, the 'default' policy will not automatically be added to generated tokens
1175
+ """
1176
+ return pulumi.get(self, "token_no_default_policy")
1177
+
1178
+ @_builtins.property
1179
+ @pulumi.getter(name="tokenNumUses")
1180
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1181
+ """
1182
+ The maximum number of times a token may be used, a value of zero means unlimited
1183
+ """
1184
+ return pulumi.get(self, "token_num_uses")
1185
+
1186
+ @_builtins.property
1187
+ @pulumi.getter(name="tokenPeriod")
1188
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1189
+ """
1190
+ Generated Token's Period
1191
+ """
1192
+ return pulumi.get(self, "token_period")
1193
+
1194
+ @_builtins.property
1195
+ @pulumi.getter(name="tokenPolicies")
1196
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1197
+ """
1198
+ Generated Token's Policies
1199
+ """
1200
+ return pulumi.get(self, "token_policies")
1201
+
1202
+ @_builtins.property
1203
+ @pulumi.getter(name="tokenTtl")
1204
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1205
+ """
1206
+ The initial ttl of the token to generate in seconds
1207
+ """
1208
+ return pulumi.get(self, "token_ttl")
1209
+
1210
+ @_builtins.property
1211
+ @pulumi.getter(name="tokenType")
1212
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1213
+ """
1214
+ The type of token to generate, service or batch
1215
+ """
1216
+ return pulumi.get(self, "token_type")
1217
+
1218
+ @_builtins.property
1219
+ @pulumi.getter
1220
+ def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
1221
+ return pulumi.get(self, "tune")
1222
+
1223
+ @_builtins.property
1224
+ @pulumi.getter
1225
+ def users(self) -> pulumi.Output[Sequence['outputs.AuthBackendUser']]:
1226
+ """
1227
+ Associate Okta users with groups or policies within Vault.
1228
+ See below for more details.
1229
+ """
1230
+ return pulumi.get(self, "users")
1231
+