pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,416 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendUserInitArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ username: pulumi.Input[_builtins.str],
24
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
27
+ """
28
+ The set of arguments for constructing a AuthBackendUser resource.
29
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
30
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
31
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
32
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
33
+ The value should not contain leading or trailing forward slashes.
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
+ *Available only for Vault Enterprise*.
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
37
+ """
38
+ pulumi.set(__self__, "path", path)
39
+ pulumi.set(__self__, "username", username)
40
+ if groups is not None:
41
+ pulumi.set(__self__, "groups", groups)
42
+ if namespace is not None:
43
+ pulumi.set(__self__, "namespace", namespace)
44
+ if policies is not None:
45
+ pulumi.set(__self__, "policies", policies)
46
+
47
+ @_builtins.property
48
+ @pulumi.getter
49
+ def path(self) -> pulumi.Input[_builtins.str]:
50
+ """
51
+ The path where the Okta auth backend is mounted
52
+ """
53
+ return pulumi.get(self, "path")
54
+
55
+ @path.setter
56
+ def path(self, value: pulumi.Input[_builtins.str]):
57
+ pulumi.set(self, "path", value)
58
+
59
+ @_builtins.property
60
+ @pulumi.getter
61
+ def username(self) -> pulumi.Input[_builtins.str]:
62
+ """
63
+ Name of the user within Okta
64
+ """
65
+ return pulumi.get(self, "username")
66
+
67
+ @username.setter
68
+ def username(self, value: pulumi.Input[_builtins.str]):
69
+ pulumi.set(self, "username", value)
70
+
71
+ @_builtins.property
72
+ @pulumi.getter
73
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
74
+ """
75
+ List of Okta groups to associate with this user
76
+ """
77
+ return pulumi.get(self, "groups")
78
+
79
+ @groups.setter
80
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
81
+ pulumi.set(self, "groups", value)
82
+
83
+ @_builtins.property
84
+ @pulumi.getter
85
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
86
+ """
87
+ The namespace to provision the resource in.
88
+ The value should not contain leading or trailing forward slashes.
89
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
90
+ *Available only for Vault Enterprise*.
91
+ """
92
+ return pulumi.get(self, "namespace")
93
+
94
+ @namespace.setter
95
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
96
+ pulumi.set(self, "namespace", value)
97
+
98
+ @_builtins.property
99
+ @pulumi.getter
100
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
101
+ """
102
+ List of Vault policies to associate with this user
103
+ """
104
+ return pulumi.get(self, "policies")
105
+
106
+ @policies.setter
107
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
108
+ pulumi.set(self, "policies", value)
109
+
110
+
111
+ @pulumi.input_type
112
+ class _AuthBackendUserState:
113
+ def __init__(__self__, *,
114
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
115
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
116
+ path: Optional[pulumi.Input[_builtins.str]] = None,
117
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
118
+ username: Optional[pulumi.Input[_builtins.str]] = None):
119
+ """
120
+ Input properties used for looking up and filtering AuthBackendUser resources.
121
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
122
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
123
+ The value should not contain leading or trailing forward slashes.
124
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
125
+ *Available only for Vault Enterprise*.
126
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
127
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
128
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
129
+ """
130
+ if groups is not None:
131
+ pulumi.set(__self__, "groups", groups)
132
+ if namespace is not None:
133
+ pulumi.set(__self__, "namespace", namespace)
134
+ if path is not None:
135
+ pulumi.set(__self__, "path", path)
136
+ if policies is not None:
137
+ pulumi.set(__self__, "policies", policies)
138
+ if username is not None:
139
+ pulumi.set(__self__, "username", username)
140
+
141
+ @_builtins.property
142
+ @pulumi.getter
143
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
144
+ """
145
+ List of Okta groups to associate with this user
146
+ """
147
+ return pulumi.get(self, "groups")
148
+
149
+ @groups.setter
150
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
151
+ pulumi.set(self, "groups", value)
152
+
153
+ @_builtins.property
154
+ @pulumi.getter
155
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
156
+ """
157
+ The namespace to provision the resource in.
158
+ The value should not contain leading or trailing forward slashes.
159
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
160
+ *Available only for Vault Enterprise*.
161
+ """
162
+ return pulumi.get(self, "namespace")
163
+
164
+ @namespace.setter
165
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
166
+ pulumi.set(self, "namespace", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter
170
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
171
+ """
172
+ The path where the Okta auth backend is mounted
173
+ """
174
+ return pulumi.get(self, "path")
175
+
176
+ @path.setter
177
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
178
+ pulumi.set(self, "path", value)
179
+
180
+ @_builtins.property
181
+ @pulumi.getter
182
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
183
+ """
184
+ List of Vault policies to associate with this user
185
+ """
186
+ return pulumi.get(self, "policies")
187
+
188
+ @policies.setter
189
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
190
+ pulumi.set(self, "policies", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter
194
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
195
+ """
196
+ Name of the user within Okta
197
+ """
198
+ return pulumi.get(self, "username")
199
+
200
+ @username.setter
201
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
202
+ pulumi.set(self, "username", value)
203
+
204
+
205
+ @pulumi.type_token("vault:okta/authBackendUser:AuthBackendUser")
206
+ class AuthBackendUser(pulumi.CustomResource):
207
+ @overload
208
+ def __init__(__self__,
209
+ resource_name: str,
210
+ opts: Optional[pulumi.ResourceOptions] = None,
211
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
212
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
213
+ path: Optional[pulumi.Input[_builtins.str]] = None,
214
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
215
+ username: Optional[pulumi.Input[_builtins.str]] = None,
216
+ __props__=None):
217
+ """
218
+ Provides a resource to create a user in an
219
+ [Okta auth backend within Vault](https://www.vaultproject.io/docs/auth/okta.html).
220
+
221
+ ## Example Usage
222
+
223
+ ```python
224
+ import pulumi
225
+ import pulumi_vault as vault
226
+
227
+ example = vault.okta.AuthBackend("example",
228
+ path="user_okta",
229
+ organization="dummy")
230
+ foo = vault.okta.AuthBackendUser("foo",
231
+ path=example.path,
232
+ username="foo",
233
+ groups=[
234
+ "one",
235
+ "two",
236
+ ])
237
+ ```
238
+
239
+ ## Import
240
+
241
+ Okta authentication backend users can be imported using its `path/user` ID format, e.g.
242
+
243
+ ```sh
244
+ $ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
245
+ ```
246
+
247
+ :param str resource_name: The name of the resource.
248
+ :param pulumi.ResourceOptions opts: Options for the resource.
249
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
250
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
251
+ The value should not contain leading or trailing forward slashes.
252
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
253
+ *Available only for Vault Enterprise*.
254
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
255
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
256
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
257
+ """
258
+ ...
259
+ @overload
260
+ def __init__(__self__,
261
+ resource_name: str,
262
+ args: AuthBackendUserInitArgs,
263
+ opts: Optional[pulumi.ResourceOptions] = None):
264
+ """
265
+ Provides a resource to create a user in an
266
+ [Okta auth backend within Vault](https://www.vaultproject.io/docs/auth/okta.html).
267
+
268
+ ## Example Usage
269
+
270
+ ```python
271
+ import pulumi
272
+ import pulumi_vault as vault
273
+
274
+ example = vault.okta.AuthBackend("example",
275
+ path="user_okta",
276
+ organization="dummy")
277
+ foo = vault.okta.AuthBackendUser("foo",
278
+ path=example.path,
279
+ username="foo",
280
+ groups=[
281
+ "one",
282
+ "two",
283
+ ])
284
+ ```
285
+
286
+ ## Import
287
+
288
+ Okta authentication backend users can be imported using its `path/user` ID format, e.g.
289
+
290
+ ```sh
291
+ $ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
292
+ ```
293
+
294
+ :param str resource_name: The name of the resource.
295
+ :param AuthBackendUserInitArgs args: The arguments to use to populate this resource's properties.
296
+ :param pulumi.ResourceOptions opts: Options for the resource.
297
+ """
298
+ ...
299
+ def __init__(__self__, resource_name: str, *args, **kwargs):
300
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendUserInitArgs, pulumi.ResourceOptions, *args, **kwargs)
301
+ if resource_args is not None:
302
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
303
+ else:
304
+ __self__._internal_init(resource_name, *args, **kwargs)
305
+
306
+ def _internal_init(__self__,
307
+ resource_name: str,
308
+ opts: Optional[pulumi.ResourceOptions] = None,
309
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
310
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
311
+ path: Optional[pulumi.Input[_builtins.str]] = None,
312
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
313
+ username: Optional[pulumi.Input[_builtins.str]] = None,
314
+ __props__=None):
315
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
316
+ if not isinstance(opts, pulumi.ResourceOptions):
317
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
318
+ if opts.id is None:
319
+ if __props__ is not None:
320
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
321
+ __props__ = AuthBackendUserInitArgs.__new__(AuthBackendUserInitArgs)
322
+
323
+ __props__.__dict__["groups"] = groups
324
+ __props__.__dict__["namespace"] = namespace
325
+ if path is None and not opts.urn:
326
+ raise TypeError("Missing required property 'path'")
327
+ __props__.__dict__["path"] = path
328
+ __props__.__dict__["policies"] = policies
329
+ if username is None and not opts.urn:
330
+ raise TypeError("Missing required property 'username'")
331
+ __props__.__dict__["username"] = username
332
+ super(AuthBackendUser, __self__).__init__(
333
+ 'vault:okta/authBackendUser:AuthBackendUser',
334
+ resource_name,
335
+ __props__,
336
+ opts)
337
+
338
+ @staticmethod
339
+ def get(resource_name: str,
340
+ id: pulumi.Input[str],
341
+ opts: Optional[pulumi.ResourceOptions] = None,
342
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
343
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
344
+ path: Optional[pulumi.Input[_builtins.str]] = None,
345
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
346
+ username: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendUser':
347
+ """
348
+ Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
349
+ properties used to qualify the lookup.
350
+
351
+ :param str resource_name: The unique name of the resulting resource.
352
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
353
+ :param pulumi.ResourceOptions opts: Options for the resource.
354
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
355
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
356
+ The value should not contain leading or trailing forward slashes.
357
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
358
+ *Available only for Vault Enterprise*.
359
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
360
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
361
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
362
+ """
363
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
364
+
365
+ __props__ = _AuthBackendUserState.__new__(_AuthBackendUserState)
366
+
367
+ __props__.__dict__["groups"] = groups
368
+ __props__.__dict__["namespace"] = namespace
369
+ __props__.__dict__["path"] = path
370
+ __props__.__dict__["policies"] = policies
371
+ __props__.__dict__["username"] = username
372
+ return AuthBackendUser(resource_name, opts=opts, __props__=__props__)
373
+
374
+ @_builtins.property
375
+ @pulumi.getter
376
+ def groups(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
377
+ """
378
+ List of Okta groups to associate with this user
379
+ """
380
+ return pulumi.get(self, "groups")
381
+
382
+ @_builtins.property
383
+ @pulumi.getter
384
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
385
+ """
386
+ The namespace to provision the resource in.
387
+ The value should not contain leading or trailing forward slashes.
388
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
389
+ *Available only for Vault Enterprise*.
390
+ """
391
+ return pulumi.get(self, "namespace")
392
+
393
+ @_builtins.property
394
+ @pulumi.getter
395
+ def path(self) -> pulumi.Output[_builtins.str]:
396
+ """
397
+ The path where the Okta auth backend is mounted
398
+ """
399
+ return pulumi.get(self, "path")
400
+
401
+ @_builtins.property
402
+ @pulumi.getter
403
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
404
+ """
405
+ List of Vault policies to associate with this user
406
+ """
407
+ return pulumi.get(self, "policies")
408
+
409
+ @_builtins.property
410
+ @pulumi.getter
411
+ def username(self) -> pulumi.Output[_builtins.str]:
412
+ """
413
+ Name of the user within Okta
414
+ """
415
+ return pulumi.get(self, "username")
416
+
@@ -0,0 +1,244 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'AuthBackendGroup',
19
+ 'AuthBackendTune',
20
+ 'AuthBackendUser',
21
+ ]
22
+
23
+ @pulumi.output_type
24
+ class AuthBackendGroup(dict):
25
+ @staticmethod
26
+ def __key_warning(key: str):
27
+ suggest = None
28
+ if key == "groupName":
29
+ suggest = "group_name"
30
+
31
+ if suggest:
32
+ pulumi.log.warn(f"Key '{key}' not found in AuthBackendGroup. Access the value via the '{suggest}' property getter instead.")
33
+
34
+ def __getitem__(self, key: str) -> Any:
35
+ AuthBackendGroup.__key_warning(key)
36
+ return super().__getitem__(key)
37
+
38
+ def get(self, key: str, default = None) -> Any:
39
+ AuthBackendGroup.__key_warning(key)
40
+ return super().get(key, default)
41
+
42
+ def __init__(__self__, *,
43
+ group_name: _builtins.str,
44
+ policies: Sequence[_builtins.str]):
45
+ """
46
+ :param _builtins.str group_name: Name of the Okta group
47
+ :param Sequence[_builtins.str] policies: Policies to associate with this group
48
+ """
49
+ pulumi.set(__self__, "group_name", group_name)
50
+ pulumi.set(__self__, "policies", policies)
51
+
52
+ @_builtins.property
53
+ @pulumi.getter(name="groupName")
54
+ def group_name(self) -> _builtins.str:
55
+ """
56
+ Name of the Okta group
57
+ """
58
+ return pulumi.get(self, "group_name")
59
+
60
+ @_builtins.property
61
+ @pulumi.getter
62
+ def policies(self) -> Sequence[_builtins.str]:
63
+ """
64
+ Policies to associate with this group
65
+ """
66
+ return pulumi.get(self, "policies")
67
+
68
+
69
+ @pulumi.output_type
70
+ class AuthBackendTune(dict):
71
+ @staticmethod
72
+ def __key_warning(key: str):
73
+ suggest = None
74
+ if key == "allowedResponseHeaders":
75
+ suggest = "allowed_response_headers"
76
+ elif key == "auditNonHmacRequestKeys":
77
+ suggest = "audit_non_hmac_request_keys"
78
+ elif key == "auditNonHmacResponseKeys":
79
+ suggest = "audit_non_hmac_response_keys"
80
+ elif key == "defaultLeaseTtl":
81
+ suggest = "default_lease_ttl"
82
+ elif key == "listingVisibility":
83
+ suggest = "listing_visibility"
84
+ elif key == "maxLeaseTtl":
85
+ suggest = "max_lease_ttl"
86
+ elif key == "passthroughRequestHeaders":
87
+ suggest = "passthrough_request_headers"
88
+ elif key == "tokenType":
89
+ suggest = "token_type"
90
+
91
+ if suggest:
92
+ pulumi.log.warn(f"Key '{key}' not found in AuthBackendTune. Access the value via the '{suggest}' property getter instead.")
93
+
94
+ def __getitem__(self, key: str) -> Any:
95
+ AuthBackendTune.__key_warning(key)
96
+ return super().__getitem__(key)
97
+
98
+ def get(self, key: str, default = None) -> Any:
99
+ AuthBackendTune.__key_warning(key)
100
+ return super().get(key, default)
101
+
102
+ def __init__(__self__, *,
103
+ allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
104
+ audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
105
+ audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
106
+ default_lease_ttl: Optional[_builtins.str] = None,
107
+ listing_visibility: Optional[_builtins.str] = None,
108
+ max_lease_ttl: Optional[_builtins.str] = None,
109
+ passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
110
+ token_type: Optional[_builtins.str] = None):
111
+ """
112
+ :param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing a plugin to include them in the response.
113
+ :param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
114
+ :param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
115
+ :param _builtins.str default_lease_ttl: Specifies the default time-to-live duration. This overrides the global default. A value of 0 is equivalent to the system default TTL
116
+ :param _builtins.str listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint. Valid values are "unauth" or "hidden". If not set, behaves like "hidden".
117
+ :param _builtins.str max_lease_ttl: Specifies the maximum time-to-live duration. This overrides the global default. A value of 0 are equivalent and set to the system max TTL.
118
+ :param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and pass from the request to the backend.
119
+ :param _builtins.str token_type: Specifies the type of tokens that should be returned by the mount.
120
+ """
121
+ if allowed_response_headers is not None:
122
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
123
+ if audit_non_hmac_request_keys is not None:
124
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
125
+ if audit_non_hmac_response_keys is not None:
126
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
127
+ if default_lease_ttl is not None:
128
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
129
+ if listing_visibility is not None:
130
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
131
+ if max_lease_ttl is not None:
132
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
133
+ if passthrough_request_headers is not None:
134
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
135
+ if token_type is not None:
136
+ pulumi.set(__self__, "token_type", token_type)
137
+
138
+ @_builtins.property
139
+ @pulumi.getter(name="allowedResponseHeaders")
140
+ def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
141
+ """
142
+ List of headers to whitelist and allowing a plugin to include them in the response.
143
+ """
144
+ return pulumi.get(self, "allowed_response_headers")
145
+
146
+ @_builtins.property
147
+ @pulumi.getter(name="auditNonHmacRequestKeys")
148
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
149
+ """
150
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
151
+ """
152
+ return pulumi.get(self, "audit_non_hmac_request_keys")
153
+
154
+ @_builtins.property
155
+ @pulumi.getter(name="auditNonHmacResponseKeys")
156
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
157
+ """
158
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
159
+ """
160
+ return pulumi.get(self, "audit_non_hmac_response_keys")
161
+
162
+ @_builtins.property
163
+ @pulumi.getter(name="defaultLeaseTtl")
164
+ def default_lease_ttl(self) -> Optional[_builtins.str]:
165
+ """
166
+ Specifies the default time-to-live duration. This overrides the global default. A value of 0 is equivalent to the system default TTL
167
+ """
168
+ return pulumi.get(self, "default_lease_ttl")
169
+
170
+ @_builtins.property
171
+ @pulumi.getter(name="listingVisibility")
172
+ def listing_visibility(self) -> Optional[_builtins.str]:
173
+ """
174
+ Specifies whether to show this mount in the UI-specific listing endpoint. Valid values are "unauth" or "hidden". If not set, behaves like "hidden".
175
+ """
176
+ return pulumi.get(self, "listing_visibility")
177
+
178
+ @_builtins.property
179
+ @pulumi.getter(name="maxLeaseTtl")
180
+ def max_lease_ttl(self) -> Optional[_builtins.str]:
181
+ """
182
+ Specifies the maximum time-to-live duration. This overrides the global default. A value of 0 are equivalent and set to the system max TTL.
183
+ """
184
+ return pulumi.get(self, "max_lease_ttl")
185
+
186
+ @_builtins.property
187
+ @pulumi.getter(name="passthroughRequestHeaders")
188
+ def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
189
+ """
190
+ List of headers to whitelist and pass from the request to the backend.
191
+ """
192
+ return pulumi.get(self, "passthrough_request_headers")
193
+
194
+ @_builtins.property
195
+ @pulumi.getter(name="tokenType")
196
+ def token_type(self) -> Optional[_builtins.str]:
197
+ """
198
+ Specifies the type of tokens that should be returned by the mount.
199
+ """
200
+ return pulumi.get(self, "token_type")
201
+
202
+
203
+ @pulumi.output_type
204
+ class AuthBackendUser(dict):
205
+ def __init__(__self__, *,
206
+ username: _builtins.str,
207
+ groups: Optional[Sequence[_builtins.str]] = None,
208
+ policies: Optional[Sequence[_builtins.str]] = None):
209
+ """
210
+ :param _builtins.str username: Name of the user within Okta
211
+ :param Sequence[_builtins.str] groups: Groups within the Okta auth backend to associate with this user
212
+ :param Sequence[_builtins.str] policies: Policies to associate with this user
213
+ """
214
+ pulumi.set(__self__, "username", username)
215
+ if groups is not None:
216
+ pulumi.set(__self__, "groups", groups)
217
+ if policies is not None:
218
+ pulumi.set(__self__, "policies", policies)
219
+
220
+ @_builtins.property
221
+ @pulumi.getter
222
+ def username(self) -> _builtins.str:
223
+ """
224
+ Name of the user within Okta
225
+ """
226
+ return pulumi.get(self, "username")
227
+
228
+ @_builtins.property
229
+ @pulumi.getter
230
+ def groups(self) -> Optional[Sequence[_builtins.str]]:
231
+ """
232
+ Groups within the Okta auth backend to associate with this user
233
+ """
234
+ return pulumi.get(self, "groups")
235
+
236
+ @_builtins.property
237
+ @pulumi.getter
238
+ def policies(self) -> Optional[Sequence[_builtins.str]]:
239
+ """
240
+ Policies to associate with this user
241
+ """
242
+ return pulumi.get(self, "policies")
243
+
244
+