pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1231 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
from ._inputs import *
|
|
18
|
+
|
|
19
|
+
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
20
|
+
|
|
21
|
+
@pulumi.input_type
|
|
22
|
+
class AuthBackendArgs:
|
|
23
|
+
def __init__(__self__, *,
|
|
24
|
+
organization: pulumi.Input[_builtins.str],
|
|
25
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
26
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
28
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
30
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
|
|
31
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
33
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
35
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
36
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
37
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
38
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
39
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
40
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
41
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
42
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
43
|
+
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
|
|
44
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
|
45
|
+
"""
|
|
46
|
+
The set of arguments for constructing a AuthBackend resource.
|
|
47
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
48
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
49
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
50
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
|
51
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
|
52
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
|
53
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
54
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
|
|
56
|
+
See below for more details.
|
|
57
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
58
|
+
The value should not contain leading or trailing forward slashes.
|
|
59
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
60
|
+
*Available only for Vault Enterprise*.
|
|
61
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
|
62
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
|
63
|
+
If this is not supplied only locally configured groups will be enabled.
|
|
64
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
65
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
66
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
67
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
68
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
69
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
70
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
71
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
72
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
73
|
+
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
|
74
|
+
See below for more details.
|
|
75
|
+
"""
|
|
76
|
+
pulumi.set(__self__, "organization", organization)
|
|
77
|
+
if alias_metadata is not None:
|
|
78
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
79
|
+
if base_url is not None:
|
|
80
|
+
pulumi.set(__self__, "base_url", base_url)
|
|
81
|
+
if bypass_okta_mfa is not None:
|
|
82
|
+
pulumi.set(__self__, "bypass_okta_mfa", bypass_okta_mfa)
|
|
83
|
+
if description is not None:
|
|
84
|
+
pulumi.set(__self__, "description", description)
|
|
85
|
+
if disable_remount is not None:
|
|
86
|
+
pulumi.set(__self__, "disable_remount", disable_remount)
|
|
87
|
+
if groups is not None:
|
|
88
|
+
pulumi.set(__self__, "groups", groups)
|
|
89
|
+
if namespace is not None:
|
|
90
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
91
|
+
if path is not None:
|
|
92
|
+
pulumi.set(__self__, "path", path)
|
|
93
|
+
if token is not None:
|
|
94
|
+
pulumi.set(__self__, "token", token)
|
|
95
|
+
if token_bound_cidrs is not None:
|
|
96
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
97
|
+
if token_explicit_max_ttl is not None:
|
|
98
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
99
|
+
if token_max_ttl is not None:
|
|
100
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
101
|
+
if token_no_default_policy is not None:
|
|
102
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
103
|
+
if token_num_uses is not None:
|
|
104
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
105
|
+
if token_period is not None:
|
|
106
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
107
|
+
if token_policies is not None:
|
|
108
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
109
|
+
if token_ttl is not None:
|
|
110
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
111
|
+
if token_type is not None:
|
|
112
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
113
|
+
if tune is not None:
|
|
114
|
+
pulumi.set(__self__, "tune", tune)
|
|
115
|
+
if users is not None:
|
|
116
|
+
pulumi.set(__self__, "users", users)
|
|
117
|
+
|
|
118
|
+
@_builtins.property
|
|
119
|
+
@pulumi.getter
|
|
120
|
+
def organization(self) -> pulumi.Input[_builtins.str]:
|
|
121
|
+
"""
|
|
122
|
+
The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
123
|
+
"""
|
|
124
|
+
return pulumi.get(self, "organization")
|
|
125
|
+
|
|
126
|
+
@organization.setter
|
|
127
|
+
def organization(self, value: pulumi.Input[_builtins.str]):
|
|
128
|
+
pulumi.set(self, "organization", value)
|
|
129
|
+
|
|
130
|
+
@_builtins.property
|
|
131
|
+
@pulumi.getter(name="aliasMetadata")
|
|
132
|
+
def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
133
|
+
"""
|
|
134
|
+
The metadata to be tied to generated entity alias.
|
|
135
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
136
|
+
"""
|
|
137
|
+
return pulumi.get(self, "alias_metadata")
|
|
138
|
+
|
|
139
|
+
@alias_metadata.setter
|
|
140
|
+
def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
141
|
+
pulumi.set(self, "alias_metadata", value)
|
|
142
|
+
|
|
143
|
+
@_builtins.property
|
|
144
|
+
@pulumi.getter(name="baseUrl")
|
|
145
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
146
|
+
"""
|
|
147
|
+
The Okta url. Examples: oktapreview.com, okta.com
|
|
148
|
+
"""
|
|
149
|
+
return pulumi.get(self, "base_url")
|
|
150
|
+
|
|
151
|
+
@base_url.setter
|
|
152
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
153
|
+
pulumi.set(self, "base_url", value)
|
|
154
|
+
|
|
155
|
+
@_builtins.property
|
|
156
|
+
@pulumi.getter(name="bypassOktaMfa")
|
|
157
|
+
def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
158
|
+
"""
|
|
159
|
+
When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
|
160
|
+
"""
|
|
161
|
+
return pulumi.get(self, "bypass_okta_mfa")
|
|
162
|
+
|
|
163
|
+
@bypass_okta_mfa.setter
|
|
164
|
+
def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
165
|
+
pulumi.set(self, "bypass_okta_mfa", value)
|
|
166
|
+
|
|
167
|
+
@_builtins.property
|
|
168
|
+
@pulumi.getter
|
|
169
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
170
|
+
"""
|
|
171
|
+
The description of the auth backend
|
|
172
|
+
"""
|
|
173
|
+
return pulumi.get(self, "description")
|
|
174
|
+
|
|
175
|
+
@description.setter
|
|
176
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
177
|
+
pulumi.set(self, "description", value)
|
|
178
|
+
|
|
179
|
+
@_builtins.property
|
|
180
|
+
@pulumi.getter(name="disableRemount")
|
|
181
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
182
|
+
"""
|
|
183
|
+
If set, opts out of mount migration on path updates.
|
|
184
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
185
|
+
"""
|
|
186
|
+
return pulumi.get(self, "disable_remount")
|
|
187
|
+
|
|
188
|
+
@disable_remount.setter
|
|
189
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
190
|
+
pulumi.set(self, "disable_remount", value)
|
|
191
|
+
|
|
192
|
+
@_builtins.property
|
|
193
|
+
@pulumi.getter
|
|
194
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
|
|
195
|
+
"""
|
|
196
|
+
Associate Okta groups with policies within Vault.
|
|
197
|
+
See below for more details.
|
|
198
|
+
"""
|
|
199
|
+
return pulumi.get(self, "groups")
|
|
200
|
+
|
|
201
|
+
@groups.setter
|
|
202
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
|
|
203
|
+
pulumi.set(self, "groups", value)
|
|
204
|
+
|
|
205
|
+
@_builtins.property
|
|
206
|
+
@pulumi.getter
|
|
207
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
208
|
+
"""
|
|
209
|
+
The namespace to provision the resource in.
|
|
210
|
+
The value should not contain leading or trailing forward slashes.
|
|
211
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
212
|
+
*Available only for Vault Enterprise*.
|
|
213
|
+
"""
|
|
214
|
+
return pulumi.get(self, "namespace")
|
|
215
|
+
|
|
216
|
+
@namespace.setter
|
|
217
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
218
|
+
pulumi.set(self, "namespace", value)
|
|
219
|
+
|
|
220
|
+
@_builtins.property
|
|
221
|
+
@pulumi.getter
|
|
222
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
223
|
+
"""
|
|
224
|
+
Path to mount the Okta auth backend. Default to path `okta`.
|
|
225
|
+
"""
|
|
226
|
+
return pulumi.get(self, "path")
|
|
227
|
+
|
|
228
|
+
@path.setter
|
|
229
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
230
|
+
pulumi.set(self, "path", value)
|
|
231
|
+
|
|
232
|
+
@_builtins.property
|
|
233
|
+
@pulumi.getter
|
|
234
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
235
|
+
"""
|
|
236
|
+
The Okta API token. This is required to query Okta for user group membership.
|
|
237
|
+
If this is not supplied only locally configured groups will be enabled.
|
|
238
|
+
"""
|
|
239
|
+
return pulumi.get(self, "token")
|
|
240
|
+
|
|
241
|
+
@token.setter
|
|
242
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
243
|
+
pulumi.set(self, "token", value)
|
|
244
|
+
|
|
245
|
+
@_builtins.property
|
|
246
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
247
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
248
|
+
"""
|
|
249
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
250
|
+
"""
|
|
251
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
252
|
+
|
|
253
|
+
@token_bound_cidrs.setter
|
|
254
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
255
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
|
256
|
+
|
|
257
|
+
@_builtins.property
|
|
258
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
259
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
260
|
+
"""
|
|
261
|
+
Generated Token's Explicit Maximum TTL in seconds
|
|
262
|
+
"""
|
|
263
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
264
|
+
|
|
265
|
+
@token_explicit_max_ttl.setter
|
|
266
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
267
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
|
268
|
+
|
|
269
|
+
@_builtins.property
|
|
270
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
271
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
272
|
+
"""
|
|
273
|
+
The maximum lifetime of the generated token
|
|
274
|
+
"""
|
|
275
|
+
return pulumi.get(self, "token_max_ttl")
|
|
276
|
+
|
|
277
|
+
@token_max_ttl.setter
|
|
278
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
279
|
+
pulumi.set(self, "token_max_ttl", value)
|
|
280
|
+
|
|
281
|
+
@_builtins.property
|
|
282
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
283
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
284
|
+
"""
|
|
285
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
|
286
|
+
"""
|
|
287
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
288
|
+
|
|
289
|
+
@token_no_default_policy.setter
|
|
290
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
291
|
+
pulumi.set(self, "token_no_default_policy", value)
|
|
292
|
+
|
|
293
|
+
@_builtins.property
|
|
294
|
+
@pulumi.getter(name="tokenNumUses")
|
|
295
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
296
|
+
"""
|
|
297
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
|
298
|
+
"""
|
|
299
|
+
return pulumi.get(self, "token_num_uses")
|
|
300
|
+
|
|
301
|
+
@token_num_uses.setter
|
|
302
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
303
|
+
pulumi.set(self, "token_num_uses", value)
|
|
304
|
+
|
|
305
|
+
@_builtins.property
|
|
306
|
+
@pulumi.getter(name="tokenPeriod")
|
|
307
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
308
|
+
"""
|
|
309
|
+
Generated Token's Period
|
|
310
|
+
"""
|
|
311
|
+
return pulumi.get(self, "token_period")
|
|
312
|
+
|
|
313
|
+
@token_period.setter
|
|
314
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
315
|
+
pulumi.set(self, "token_period", value)
|
|
316
|
+
|
|
317
|
+
@_builtins.property
|
|
318
|
+
@pulumi.getter(name="tokenPolicies")
|
|
319
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
320
|
+
"""
|
|
321
|
+
Generated Token's Policies
|
|
322
|
+
"""
|
|
323
|
+
return pulumi.get(self, "token_policies")
|
|
324
|
+
|
|
325
|
+
@token_policies.setter
|
|
326
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
327
|
+
pulumi.set(self, "token_policies", value)
|
|
328
|
+
|
|
329
|
+
@_builtins.property
|
|
330
|
+
@pulumi.getter(name="tokenTtl")
|
|
331
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
332
|
+
"""
|
|
333
|
+
The initial ttl of the token to generate in seconds
|
|
334
|
+
"""
|
|
335
|
+
return pulumi.get(self, "token_ttl")
|
|
336
|
+
|
|
337
|
+
@token_ttl.setter
|
|
338
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
339
|
+
pulumi.set(self, "token_ttl", value)
|
|
340
|
+
|
|
341
|
+
@_builtins.property
|
|
342
|
+
@pulumi.getter(name="tokenType")
|
|
343
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
344
|
+
"""
|
|
345
|
+
The type of token to generate, service or batch
|
|
346
|
+
"""
|
|
347
|
+
return pulumi.get(self, "token_type")
|
|
348
|
+
|
|
349
|
+
@token_type.setter
|
|
350
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
351
|
+
pulumi.set(self, "token_type", value)
|
|
352
|
+
|
|
353
|
+
@_builtins.property
|
|
354
|
+
@pulumi.getter
|
|
355
|
+
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
|
356
|
+
return pulumi.get(self, "tune")
|
|
357
|
+
|
|
358
|
+
@tune.setter
|
|
359
|
+
def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
|
|
360
|
+
pulumi.set(self, "tune", value)
|
|
361
|
+
|
|
362
|
+
@_builtins.property
|
|
363
|
+
@pulumi.getter
|
|
364
|
+
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
|
|
365
|
+
"""
|
|
366
|
+
Associate Okta users with groups or policies within Vault.
|
|
367
|
+
See below for more details.
|
|
368
|
+
"""
|
|
369
|
+
return pulumi.get(self, "users")
|
|
370
|
+
|
|
371
|
+
@users.setter
|
|
372
|
+
def users(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]):
|
|
373
|
+
pulumi.set(self, "users", value)
|
|
374
|
+
|
|
375
|
+
|
|
376
|
+
@pulumi.input_type
|
|
377
|
+
class _AuthBackendState:
|
|
378
|
+
def __init__(__self__, *,
|
|
379
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
380
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
381
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
382
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
383
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
384
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
385
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
|
|
386
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
387
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
388
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
389
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
390
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
391
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
392
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
393
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
394
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
395
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
396
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
397
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
398
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
399
|
+
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
|
|
400
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
|
401
|
+
"""
|
|
402
|
+
Input properties used for looking up and filtering AuthBackend resources.
|
|
403
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
404
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
405
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
406
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
|
407
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
|
408
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
|
409
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
410
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
411
|
+
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
|
|
412
|
+
See below for more details.
|
|
413
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
414
|
+
The value should not contain leading or trailing forward slashes.
|
|
415
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
416
|
+
*Available only for Vault Enterprise*.
|
|
417
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
418
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
|
419
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
|
420
|
+
If this is not supplied only locally configured groups will be enabled.
|
|
421
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
422
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
423
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
424
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
425
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
426
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
427
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
428
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
429
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
430
|
+
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
|
431
|
+
See below for more details.
|
|
432
|
+
"""
|
|
433
|
+
if accessor is not None:
|
|
434
|
+
pulumi.set(__self__, "accessor", accessor)
|
|
435
|
+
if alias_metadata is not None:
|
|
436
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
437
|
+
if base_url is not None:
|
|
438
|
+
pulumi.set(__self__, "base_url", base_url)
|
|
439
|
+
if bypass_okta_mfa is not None:
|
|
440
|
+
pulumi.set(__self__, "bypass_okta_mfa", bypass_okta_mfa)
|
|
441
|
+
if description is not None:
|
|
442
|
+
pulumi.set(__self__, "description", description)
|
|
443
|
+
if disable_remount is not None:
|
|
444
|
+
pulumi.set(__self__, "disable_remount", disable_remount)
|
|
445
|
+
if groups is not None:
|
|
446
|
+
pulumi.set(__self__, "groups", groups)
|
|
447
|
+
if namespace is not None:
|
|
448
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
449
|
+
if organization is not None:
|
|
450
|
+
pulumi.set(__self__, "organization", organization)
|
|
451
|
+
if path is not None:
|
|
452
|
+
pulumi.set(__self__, "path", path)
|
|
453
|
+
if token is not None:
|
|
454
|
+
pulumi.set(__self__, "token", token)
|
|
455
|
+
if token_bound_cidrs is not None:
|
|
456
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
457
|
+
if token_explicit_max_ttl is not None:
|
|
458
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
459
|
+
if token_max_ttl is not None:
|
|
460
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
461
|
+
if token_no_default_policy is not None:
|
|
462
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
463
|
+
if token_num_uses is not None:
|
|
464
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
465
|
+
if token_period is not None:
|
|
466
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
467
|
+
if token_policies is not None:
|
|
468
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
469
|
+
if token_ttl is not None:
|
|
470
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
471
|
+
if token_type is not None:
|
|
472
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
473
|
+
if tune is not None:
|
|
474
|
+
pulumi.set(__self__, "tune", tune)
|
|
475
|
+
if users is not None:
|
|
476
|
+
pulumi.set(__self__, "users", users)
|
|
477
|
+
|
|
478
|
+
@_builtins.property
|
|
479
|
+
@pulumi.getter
|
|
480
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
481
|
+
"""
|
|
482
|
+
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
483
|
+
"""
|
|
484
|
+
return pulumi.get(self, "accessor")
|
|
485
|
+
|
|
486
|
+
@accessor.setter
|
|
487
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
488
|
+
pulumi.set(self, "accessor", value)
|
|
489
|
+
|
|
490
|
+
@_builtins.property
|
|
491
|
+
@pulumi.getter(name="aliasMetadata")
|
|
492
|
+
def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
493
|
+
"""
|
|
494
|
+
The metadata to be tied to generated entity alias.
|
|
495
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
496
|
+
"""
|
|
497
|
+
return pulumi.get(self, "alias_metadata")
|
|
498
|
+
|
|
499
|
+
@alias_metadata.setter
|
|
500
|
+
def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
501
|
+
pulumi.set(self, "alias_metadata", value)
|
|
502
|
+
|
|
503
|
+
@_builtins.property
|
|
504
|
+
@pulumi.getter(name="baseUrl")
|
|
505
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
506
|
+
"""
|
|
507
|
+
The Okta url. Examples: oktapreview.com, okta.com
|
|
508
|
+
"""
|
|
509
|
+
return pulumi.get(self, "base_url")
|
|
510
|
+
|
|
511
|
+
@base_url.setter
|
|
512
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
513
|
+
pulumi.set(self, "base_url", value)
|
|
514
|
+
|
|
515
|
+
@_builtins.property
|
|
516
|
+
@pulumi.getter(name="bypassOktaMfa")
|
|
517
|
+
def bypass_okta_mfa(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
518
|
+
"""
|
|
519
|
+
When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
|
520
|
+
"""
|
|
521
|
+
return pulumi.get(self, "bypass_okta_mfa")
|
|
522
|
+
|
|
523
|
+
@bypass_okta_mfa.setter
|
|
524
|
+
def bypass_okta_mfa(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
525
|
+
pulumi.set(self, "bypass_okta_mfa", value)
|
|
526
|
+
|
|
527
|
+
@_builtins.property
|
|
528
|
+
@pulumi.getter
|
|
529
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
530
|
+
"""
|
|
531
|
+
The description of the auth backend
|
|
532
|
+
"""
|
|
533
|
+
return pulumi.get(self, "description")
|
|
534
|
+
|
|
535
|
+
@description.setter
|
|
536
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
537
|
+
pulumi.set(self, "description", value)
|
|
538
|
+
|
|
539
|
+
@_builtins.property
|
|
540
|
+
@pulumi.getter(name="disableRemount")
|
|
541
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
542
|
+
"""
|
|
543
|
+
If set, opts out of mount migration on path updates.
|
|
544
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
545
|
+
"""
|
|
546
|
+
return pulumi.get(self, "disable_remount")
|
|
547
|
+
|
|
548
|
+
@disable_remount.setter
|
|
549
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
550
|
+
pulumi.set(self, "disable_remount", value)
|
|
551
|
+
|
|
552
|
+
@_builtins.property
|
|
553
|
+
@pulumi.getter
|
|
554
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]:
|
|
555
|
+
"""
|
|
556
|
+
Associate Okta groups with policies within Vault.
|
|
557
|
+
See below for more details.
|
|
558
|
+
"""
|
|
559
|
+
return pulumi.get(self, "groups")
|
|
560
|
+
|
|
561
|
+
@groups.setter
|
|
562
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
|
|
563
|
+
pulumi.set(self, "groups", value)
|
|
564
|
+
|
|
565
|
+
@_builtins.property
|
|
566
|
+
@pulumi.getter
|
|
567
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
568
|
+
"""
|
|
569
|
+
The namespace to provision the resource in.
|
|
570
|
+
The value should not contain leading or trailing forward slashes.
|
|
571
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
572
|
+
*Available only for Vault Enterprise*.
|
|
573
|
+
"""
|
|
574
|
+
return pulumi.get(self, "namespace")
|
|
575
|
+
|
|
576
|
+
@namespace.setter
|
|
577
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
578
|
+
pulumi.set(self, "namespace", value)
|
|
579
|
+
|
|
580
|
+
@_builtins.property
|
|
581
|
+
@pulumi.getter
|
|
582
|
+
def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
583
|
+
"""
|
|
584
|
+
The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
585
|
+
"""
|
|
586
|
+
return pulumi.get(self, "organization")
|
|
587
|
+
|
|
588
|
+
@organization.setter
|
|
589
|
+
def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
590
|
+
pulumi.set(self, "organization", value)
|
|
591
|
+
|
|
592
|
+
@_builtins.property
|
|
593
|
+
@pulumi.getter
|
|
594
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
595
|
+
"""
|
|
596
|
+
Path to mount the Okta auth backend. Default to path `okta`.
|
|
597
|
+
"""
|
|
598
|
+
return pulumi.get(self, "path")
|
|
599
|
+
|
|
600
|
+
@path.setter
|
|
601
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
602
|
+
pulumi.set(self, "path", value)
|
|
603
|
+
|
|
604
|
+
@_builtins.property
|
|
605
|
+
@pulumi.getter
|
|
606
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
607
|
+
"""
|
|
608
|
+
The Okta API token. This is required to query Okta for user group membership.
|
|
609
|
+
If this is not supplied only locally configured groups will be enabled.
|
|
610
|
+
"""
|
|
611
|
+
return pulumi.get(self, "token")
|
|
612
|
+
|
|
613
|
+
@token.setter
|
|
614
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
615
|
+
pulumi.set(self, "token", value)
|
|
616
|
+
|
|
617
|
+
@_builtins.property
|
|
618
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
619
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
620
|
+
"""
|
|
621
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
622
|
+
"""
|
|
623
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
624
|
+
|
|
625
|
+
@token_bound_cidrs.setter
|
|
626
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
627
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
|
628
|
+
|
|
629
|
+
@_builtins.property
|
|
630
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
631
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
632
|
+
"""
|
|
633
|
+
Generated Token's Explicit Maximum TTL in seconds
|
|
634
|
+
"""
|
|
635
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
636
|
+
|
|
637
|
+
@token_explicit_max_ttl.setter
|
|
638
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
639
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
|
640
|
+
|
|
641
|
+
@_builtins.property
|
|
642
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
643
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
644
|
+
"""
|
|
645
|
+
The maximum lifetime of the generated token
|
|
646
|
+
"""
|
|
647
|
+
return pulumi.get(self, "token_max_ttl")
|
|
648
|
+
|
|
649
|
+
@token_max_ttl.setter
|
|
650
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
651
|
+
pulumi.set(self, "token_max_ttl", value)
|
|
652
|
+
|
|
653
|
+
@_builtins.property
|
|
654
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
655
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
656
|
+
"""
|
|
657
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
|
658
|
+
"""
|
|
659
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
660
|
+
|
|
661
|
+
@token_no_default_policy.setter
|
|
662
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
663
|
+
pulumi.set(self, "token_no_default_policy", value)
|
|
664
|
+
|
|
665
|
+
@_builtins.property
|
|
666
|
+
@pulumi.getter(name="tokenNumUses")
|
|
667
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
668
|
+
"""
|
|
669
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
|
670
|
+
"""
|
|
671
|
+
return pulumi.get(self, "token_num_uses")
|
|
672
|
+
|
|
673
|
+
@token_num_uses.setter
|
|
674
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
675
|
+
pulumi.set(self, "token_num_uses", value)
|
|
676
|
+
|
|
677
|
+
@_builtins.property
|
|
678
|
+
@pulumi.getter(name="tokenPeriod")
|
|
679
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
680
|
+
"""
|
|
681
|
+
Generated Token's Period
|
|
682
|
+
"""
|
|
683
|
+
return pulumi.get(self, "token_period")
|
|
684
|
+
|
|
685
|
+
@token_period.setter
|
|
686
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
687
|
+
pulumi.set(self, "token_period", value)
|
|
688
|
+
|
|
689
|
+
@_builtins.property
|
|
690
|
+
@pulumi.getter(name="tokenPolicies")
|
|
691
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
692
|
+
"""
|
|
693
|
+
Generated Token's Policies
|
|
694
|
+
"""
|
|
695
|
+
return pulumi.get(self, "token_policies")
|
|
696
|
+
|
|
697
|
+
@token_policies.setter
|
|
698
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
699
|
+
pulumi.set(self, "token_policies", value)
|
|
700
|
+
|
|
701
|
+
@_builtins.property
|
|
702
|
+
@pulumi.getter(name="tokenTtl")
|
|
703
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
704
|
+
"""
|
|
705
|
+
The initial ttl of the token to generate in seconds
|
|
706
|
+
"""
|
|
707
|
+
return pulumi.get(self, "token_ttl")
|
|
708
|
+
|
|
709
|
+
@token_ttl.setter
|
|
710
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
711
|
+
pulumi.set(self, "token_ttl", value)
|
|
712
|
+
|
|
713
|
+
@_builtins.property
|
|
714
|
+
@pulumi.getter(name="tokenType")
|
|
715
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
716
|
+
"""
|
|
717
|
+
The type of token to generate, service or batch
|
|
718
|
+
"""
|
|
719
|
+
return pulumi.get(self, "token_type")
|
|
720
|
+
|
|
721
|
+
@token_type.setter
|
|
722
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
723
|
+
pulumi.set(self, "token_type", value)
|
|
724
|
+
|
|
725
|
+
@_builtins.property
|
|
726
|
+
@pulumi.getter
|
|
727
|
+
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
|
728
|
+
return pulumi.get(self, "tune")
|
|
729
|
+
|
|
730
|
+
@tune.setter
|
|
731
|
+
def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
|
|
732
|
+
pulumi.set(self, "tune", value)
|
|
733
|
+
|
|
734
|
+
@_builtins.property
|
|
735
|
+
@pulumi.getter
|
|
736
|
+
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
|
|
737
|
+
"""
|
|
738
|
+
Associate Okta users with groups or policies within Vault.
|
|
739
|
+
See below for more details.
|
|
740
|
+
"""
|
|
741
|
+
return pulumi.get(self, "users")
|
|
742
|
+
|
|
743
|
+
@users.setter
|
|
744
|
+
def users(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]):
|
|
745
|
+
pulumi.set(self, "users", value)
|
|
746
|
+
|
|
747
|
+
|
|
748
|
+
@pulumi.type_token("vault:okta/authBackend:AuthBackend")
|
|
749
|
+
class AuthBackend(pulumi.CustomResource):
|
|
750
|
+
@overload
|
|
751
|
+
def __init__(__self__,
|
|
752
|
+
resource_name: str,
|
|
753
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
754
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
755
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
756
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
757
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
758
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
759
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
|
760
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
761
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
762
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
763
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
764
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
765
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
766
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
767
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
768
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
769
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
770
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
771
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
772
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
773
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
|
774
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
|
775
|
+
__props__=None):
|
|
776
|
+
"""
|
|
777
|
+
Provides a resource for managing an
|
|
778
|
+
[Okta auth backend within Vault](https://www.vaultproject.io/docs/auth/okta.html).
|
|
779
|
+
|
|
780
|
+
## Example Usage
|
|
781
|
+
|
|
782
|
+
```python
|
|
783
|
+
import pulumi
|
|
784
|
+
import pulumi_vault as vault
|
|
785
|
+
|
|
786
|
+
example = vault.okta.AuthBackend("example",
|
|
787
|
+
description="Demonstration of the Terraform Okta auth backend",
|
|
788
|
+
organization="example",
|
|
789
|
+
token="something that should be kept secret",
|
|
790
|
+
groups=[{
|
|
791
|
+
"group_name": "foo",
|
|
792
|
+
"policies": [
|
|
793
|
+
"one",
|
|
794
|
+
"two",
|
|
795
|
+
],
|
|
796
|
+
}],
|
|
797
|
+
users=[{
|
|
798
|
+
"username": "bar",
|
|
799
|
+
"groups": ["foo"],
|
|
800
|
+
}])
|
|
801
|
+
```
|
|
802
|
+
|
|
803
|
+
## Import
|
|
804
|
+
|
|
805
|
+
Okta authentication backends can be imported using its `path`, e.g.
|
|
806
|
+
|
|
807
|
+
```sh
|
|
808
|
+
$ pulumi import vault:okta/authBackend:AuthBackend example okta
|
|
809
|
+
```
|
|
810
|
+
|
|
811
|
+
:param str resource_name: The name of the resource.
|
|
812
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
813
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
814
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
815
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
|
816
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
|
817
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
|
818
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
819
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
820
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
|
821
|
+
See below for more details.
|
|
822
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
823
|
+
The value should not contain leading or trailing forward slashes.
|
|
824
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
825
|
+
*Available only for Vault Enterprise*.
|
|
826
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
827
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
|
828
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
|
829
|
+
If this is not supplied only locally configured groups will be enabled.
|
|
830
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
831
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
832
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
833
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
834
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
835
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
836
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
837
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
838
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
839
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
|
840
|
+
See below for more details.
|
|
841
|
+
"""
|
|
842
|
+
...
|
|
843
|
+
@overload
|
|
844
|
+
def __init__(__self__,
|
|
845
|
+
resource_name: str,
|
|
846
|
+
args: AuthBackendArgs,
|
|
847
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
848
|
+
"""
|
|
849
|
+
Provides a resource for managing an
|
|
850
|
+
[Okta auth backend within Vault](https://www.vaultproject.io/docs/auth/okta.html).
|
|
851
|
+
|
|
852
|
+
## Example Usage
|
|
853
|
+
|
|
854
|
+
```python
|
|
855
|
+
import pulumi
|
|
856
|
+
import pulumi_vault as vault
|
|
857
|
+
|
|
858
|
+
example = vault.okta.AuthBackend("example",
|
|
859
|
+
description="Demonstration of the Terraform Okta auth backend",
|
|
860
|
+
organization="example",
|
|
861
|
+
token="something that should be kept secret",
|
|
862
|
+
groups=[{
|
|
863
|
+
"group_name": "foo",
|
|
864
|
+
"policies": [
|
|
865
|
+
"one",
|
|
866
|
+
"two",
|
|
867
|
+
],
|
|
868
|
+
}],
|
|
869
|
+
users=[{
|
|
870
|
+
"username": "bar",
|
|
871
|
+
"groups": ["foo"],
|
|
872
|
+
}])
|
|
873
|
+
```
|
|
874
|
+
|
|
875
|
+
## Import
|
|
876
|
+
|
|
877
|
+
Okta authentication backends can be imported using its `path`, e.g.
|
|
878
|
+
|
|
879
|
+
```sh
|
|
880
|
+
$ pulumi import vault:okta/authBackend:AuthBackend example okta
|
|
881
|
+
```
|
|
882
|
+
|
|
883
|
+
:param str resource_name: The name of the resource.
|
|
884
|
+
:param AuthBackendArgs args: The arguments to use to populate this resource's properties.
|
|
885
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
886
|
+
"""
|
|
887
|
+
...
|
|
888
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
889
|
+
resource_args, opts = _utilities.get_resource_args_opts(AuthBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
890
|
+
if resource_args is not None:
|
|
891
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
892
|
+
else:
|
|
893
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
894
|
+
|
|
895
|
+
def _internal_init(__self__,
|
|
896
|
+
resource_name: str,
|
|
897
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
898
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
899
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
900
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
901
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
902
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
903
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
|
904
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
905
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
906
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
907
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
908
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
909
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
910
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
911
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
912
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
913
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
914
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
915
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
916
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
917
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
|
918
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
|
919
|
+
__props__=None):
|
|
920
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
921
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
922
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
923
|
+
if opts.id is None:
|
|
924
|
+
if __props__ is not None:
|
|
925
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
926
|
+
__props__ = AuthBackendArgs.__new__(AuthBackendArgs)
|
|
927
|
+
|
|
928
|
+
__props__.__dict__["alias_metadata"] = alias_metadata
|
|
929
|
+
__props__.__dict__["base_url"] = base_url
|
|
930
|
+
__props__.__dict__["bypass_okta_mfa"] = bypass_okta_mfa
|
|
931
|
+
__props__.__dict__["description"] = description
|
|
932
|
+
__props__.__dict__["disable_remount"] = disable_remount
|
|
933
|
+
__props__.__dict__["groups"] = groups
|
|
934
|
+
__props__.__dict__["namespace"] = namespace
|
|
935
|
+
if organization is None and not opts.urn:
|
|
936
|
+
raise TypeError("Missing required property 'organization'")
|
|
937
|
+
__props__.__dict__["organization"] = organization
|
|
938
|
+
__props__.__dict__["path"] = path
|
|
939
|
+
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
|
940
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
|
941
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
|
942
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
|
943
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
|
944
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
|
945
|
+
__props__.__dict__["token_period"] = token_period
|
|
946
|
+
__props__.__dict__["token_policies"] = token_policies
|
|
947
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
|
948
|
+
__props__.__dict__["token_type"] = token_type
|
|
949
|
+
__props__.__dict__["tune"] = tune
|
|
950
|
+
__props__.__dict__["users"] = users
|
|
951
|
+
__props__.__dict__["accessor"] = None
|
|
952
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["token"])
|
|
953
|
+
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
954
|
+
super(AuthBackend, __self__).__init__(
|
|
955
|
+
'vault:okta/authBackend:AuthBackend',
|
|
956
|
+
resource_name,
|
|
957
|
+
__props__,
|
|
958
|
+
opts)
|
|
959
|
+
|
|
960
|
+
@staticmethod
|
|
961
|
+
def get(resource_name: str,
|
|
962
|
+
id: pulumi.Input[str],
|
|
963
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
964
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
965
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
966
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
967
|
+
bypass_okta_mfa: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
968
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
969
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
970
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
|
971
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
972
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
973
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
974
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
975
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
976
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
977
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
978
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
979
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
980
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
981
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
982
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
983
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
984
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
|
985
|
+
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
|
|
986
|
+
"""
|
|
987
|
+
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
|
988
|
+
properties used to qualify the lookup.
|
|
989
|
+
|
|
990
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
991
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
992
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
993
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
994
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
995
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
996
|
+
:param pulumi.Input[_builtins.str] base_url: The Okta url. Examples: oktapreview.com, okta.com
|
|
997
|
+
:param pulumi.Input[_builtins.bool] bypass_okta_mfa: When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
|
998
|
+
:param pulumi.Input[_builtins.str] description: The description of the auth backend
|
|
999
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
1000
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
1001
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
|
1002
|
+
See below for more details.
|
|
1003
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
1004
|
+
The value should not contain leading or trailing forward slashes.
|
|
1005
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1006
|
+
*Available only for Vault Enterprise*.
|
|
1007
|
+
:param pulumi.Input[_builtins.str] organization: The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
1008
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
|
1009
|
+
:param pulumi.Input[_builtins.str] token: The Okta API token. This is required to query Okta for user group membership.
|
|
1010
|
+
If this is not supplied only locally configured groups will be enabled.
|
|
1011
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
1012
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
1013
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
1014
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
1015
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
1016
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
1017
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
1018
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
1019
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
1020
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
|
1021
|
+
See below for more details.
|
|
1022
|
+
"""
|
|
1023
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
1024
|
+
|
|
1025
|
+
__props__ = _AuthBackendState.__new__(_AuthBackendState)
|
|
1026
|
+
|
|
1027
|
+
__props__.__dict__["accessor"] = accessor
|
|
1028
|
+
__props__.__dict__["alias_metadata"] = alias_metadata
|
|
1029
|
+
__props__.__dict__["base_url"] = base_url
|
|
1030
|
+
__props__.__dict__["bypass_okta_mfa"] = bypass_okta_mfa
|
|
1031
|
+
__props__.__dict__["description"] = description
|
|
1032
|
+
__props__.__dict__["disable_remount"] = disable_remount
|
|
1033
|
+
__props__.__dict__["groups"] = groups
|
|
1034
|
+
__props__.__dict__["namespace"] = namespace
|
|
1035
|
+
__props__.__dict__["organization"] = organization
|
|
1036
|
+
__props__.__dict__["path"] = path
|
|
1037
|
+
__props__.__dict__["token"] = token
|
|
1038
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
|
1039
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
|
1040
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
|
1041
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
|
1042
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
|
1043
|
+
__props__.__dict__["token_period"] = token_period
|
|
1044
|
+
__props__.__dict__["token_policies"] = token_policies
|
|
1045
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
|
1046
|
+
__props__.__dict__["token_type"] = token_type
|
|
1047
|
+
__props__.__dict__["tune"] = tune
|
|
1048
|
+
__props__.__dict__["users"] = users
|
|
1049
|
+
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
|
1050
|
+
|
|
1051
|
+
@_builtins.property
|
|
1052
|
+
@pulumi.getter
|
|
1053
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
|
1054
|
+
"""
|
|
1055
|
+
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
1056
|
+
"""
|
|
1057
|
+
return pulumi.get(self, "accessor")
|
|
1058
|
+
|
|
1059
|
+
@_builtins.property
|
|
1060
|
+
@pulumi.getter(name="aliasMetadata")
|
|
1061
|
+
def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
|
1062
|
+
"""
|
|
1063
|
+
The metadata to be tied to generated entity alias.
|
|
1064
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
1065
|
+
"""
|
|
1066
|
+
return pulumi.get(self, "alias_metadata")
|
|
1067
|
+
|
|
1068
|
+
@_builtins.property
|
|
1069
|
+
@pulumi.getter(name="baseUrl")
|
|
1070
|
+
def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1071
|
+
"""
|
|
1072
|
+
The Okta url. Examples: oktapreview.com, okta.com
|
|
1073
|
+
"""
|
|
1074
|
+
return pulumi.get(self, "base_url")
|
|
1075
|
+
|
|
1076
|
+
@_builtins.property
|
|
1077
|
+
@pulumi.getter(name="bypassOktaMfa")
|
|
1078
|
+
def bypass_okta_mfa(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1079
|
+
"""
|
|
1080
|
+
When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired.
|
|
1081
|
+
"""
|
|
1082
|
+
return pulumi.get(self, "bypass_okta_mfa")
|
|
1083
|
+
|
|
1084
|
+
@_builtins.property
|
|
1085
|
+
@pulumi.getter
|
|
1086
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1087
|
+
"""
|
|
1088
|
+
The description of the auth backend
|
|
1089
|
+
"""
|
|
1090
|
+
return pulumi.get(self, "description")
|
|
1091
|
+
|
|
1092
|
+
@_builtins.property
|
|
1093
|
+
@pulumi.getter(name="disableRemount")
|
|
1094
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1095
|
+
"""
|
|
1096
|
+
If set, opts out of mount migration on path updates.
|
|
1097
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
1098
|
+
"""
|
|
1099
|
+
return pulumi.get(self, "disable_remount")
|
|
1100
|
+
|
|
1101
|
+
@_builtins.property
|
|
1102
|
+
@pulumi.getter
|
|
1103
|
+
def groups(self) -> pulumi.Output[Sequence['outputs.AuthBackendGroup']]:
|
|
1104
|
+
"""
|
|
1105
|
+
Associate Okta groups with policies within Vault.
|
|
1106
|
+
See below for more details.
|
|
1107
|
+
"""
|
|
1108
|
+
return pulumi.get(self, "groups")
|
|
1109
|
+
|
|
1110
|
+
@_builtins.property
|
|
1111
|
+
@pulumi.getter
|
|
1112
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1113
|
+
"""
|
|
1114
|
+
The namespace to provision the resource in.
|
|
1115
|
+
The value should not contain leading or trailing forward slashes.
|
|
1116
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1117
|
+
*Available only for Vault Enterprise*.
|
|
1118
|
+
"""
|
|
1119
|
+
return pulumi.get(self, "namespace")
|
|
1120
|
+
|
|
1121
|
+
@_builtins.property
|
|
1122
|
+
@pulumi.getter
|
|
1123
|
+
def organization(self) -> pulumi.Output[_builtins.str]:
|
|
1124
|
+
"""
|
|
1125
|
+
The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
1126
|
+
"""
|
|
1127
|
+
return pulumi.get(self, "organization")
|
|
1128
|
+
|
|
1129
|
+
@_builtins.property
|
|
1130
|
+
@pulumi.getter
|
|
1131
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1132
|
+
"""
|
|
1133
|
+
Path to mount the Okta auth backend. Default to path `okta`.
|
|
1134
|
+
"""
|
|
1135
|
+
return pulumi.get(self, "path")
|
|
1136
|
+
|
|
1137
|
+
@_builtins.property
|
|
1138
|
+
@pulumi.getter
|
|
1139
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1140
|
+
"""
|
|
1141
|
+
The Okta API token. This is required to query Okta for user group membership.
|
|
1142
|
+
If this is not supplied only locally configured groups will be enabled.
|
|
1143
|
+
"""
|
|
1144
|
+
return pulumi.get(self, "token")
|
|
1145
|
+
|
|
1146
|
+
@_builtins.property
|
|
1147
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
1148
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1149
|
+
"""
|
|
1150
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
1151
|
+
"""
|
|
1152
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
1153
|
+
|
|
1154
|
+
@_builtins.property
|
|
1155
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
1156
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1157
|
+
"""
|
|
1158
|
+
Generated Token's Explicit Maximum TTL in seconds
|
|
1159
|
+
"""
|
|
1160
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
1161
|
+
|
|
1162
|
+
@_builtins.property
|
|
1163
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
1164
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1165
|
+
"""
|
|
1166
|
+
The maximum lifetime of the generated token
|
|
1167
|
+
"""
|
|
1168
|
+
return pulumi.get(self, "token_max_ttl")
|
|
1169
|
+
|
|
1170
|
+
@_builtins.property
|
|
1171
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
1172
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1173
|
+
"""
|
|
1174
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
|
1175
|
+
"""
|
|
1176
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
1177
|
+
|
|
1178
|
+
@_builtins.property
|
|
1179
|
+
@pulumi.getter(name="tokenNumUses")
|
|
1180
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1181
|
+
"""
|
|
1182
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
|
1183
|
+
"""
|
|
1184
|
+
return pulumi.get(self, "token_num_uses")
|
|
1185
|
+
|
|
1186
|
+
@_builtins.property
|
|
1187
|
+
@pulumi.getter(name="tokenPeriod")
|
|
1188
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1189
|
+
"""
|
|
1190
|
+
Generated Token's Period
|
|
1191
|
+
"""
|
|
1192
|
+
return pulumi.get(self, "token_period")
|
|
1193
|
+
|
|
1194
|
+
@_builtins.property
|
|
1195
|
+
@pulumi.getter(name="tokenPolicies")
|
|
1196
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1197
|
+
"""
|
|
1198
|
+
Generated Token's Policies
|
|
1199
|
+
"""
|
|
1200
|
+
return pulumi.get(self, "token_policies")
|
|
1201
|
+
|
|
1202
|
+
@_builtins.property
|
|
1203
|
+
@pulumi.getter(name="tokenTtl")
|
|
1204
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1205
|
+
"""
|
|
1206
|
+
The initial ttl of the token to generate in seconds
|
|
1207
|
+
"""
|
|
1208
|
+
return pulumi.get(self, "token_ttl")
|
|
1209
|
+
|
|
1210
|
+
@_builtins.property
|
|
1211
|
+
@pulumi.getter(name="tokenType")
|
|
1212
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1213
|
+
"""
|
|
1214
|
+
The type of token to generate, service or batch
|
|
1215
|
+
"""
|
|
1216
|
+
return pulumi.get(self, "token_type")
|
|
1217
|
+
|
|
1218
|
+
@_builtins.property
|
|
1219
|
+
@pulumi.getter
|
|
1220
|
+
def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
|
|
1221
|
+
return pulumi.get(self, "tune")
|
|
1222
|
+
|
|
1223
|
+
@_builtins.property
|
|
1224
|
+
@pulumi.getter
|
|
1225
|
+
def users(self) -> pulumi.Output[Sequence['outputs.AuthBackendUser']]:
|
|
1226
|
+
"""
|
|
1227
|
+
Associate Okta users with groups or policies within Vault.
|
|
1228
|
+
See below for more details.
|
|
1229
|
+
"""
|
|
1230
|
+
return pulumi.get(self, "users")
|
|
1231
|
+
|