pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,811 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['AuthBackendArgs', 'AuthBackend']
20
+
21
+ @pulumi.input_type
22
+ class AuthBackendArgs:
23
+ def __init__(__self__, *,
24
+ acs_urls: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
25
+ entity_id: pulumi.Input[_builtins.str],
26
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
29
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
30
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
31
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
33
+ path: Optional[pulumi.Input[_builtins.str]] = None,
34
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
35
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None):
36
+ """
37
+ The set of arguments for constructing a AuthBackend resource.
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
39
+ that should receive a response from the identity provider.
40
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
41
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
42
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
43
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
44
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
45
+ with `idp_metadata_url`.
46
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
47
+ `idp_metadata_url`.
48
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
49
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
50
+ `idp_metadata_url`.
51
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
52
+ The value should not contain leading or trailing forward slashes.
53
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
54
+ *Available only for Vault Enterprise*.
55
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
56
+ if not specified.
57
+ :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
58
+
59
+ The `tune` block is used to tune the auth backend:
60
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
61
+ information during the SAML exchange according to the current logging level. Not
62
+ recommended for production.
63
+ """
64
+ pulumi.set(__self__, "acs_urls", acs_urls)
65
+ pulumi.set(__self__, "entity_id", entity_id)
66
+ if default_role is not None:
67
+ pulumi.set(__self__, "default_role", default_role)
68
+ if disable_remount is not None:
69
+ pulumi.set(__self__, "disable_remount", disable_remount)
70
+ if idp_cert is not None:
71
+ pulumi.set(__self__, "idp_cert", idp_cert)
72
+ if idp_entity_id is not None:
73
+ pulumi.set(__self__, "idp_entity_id", idp_entity_id)
74
+ if idp_metadata_url is not None:
75
+ pulumi.set(__self__, "idp_metadata_url", idp_metadata_url)
76
+ if idp_sso_url is not None:
77
+ pulumi.set(__self__, "idp_sso_url", idp_sso_url)
78
+ if namespace is not None:
79
+ pulumi.set(__self__, "namespace", namespace)
80
+ if path is not None:
81
+ pulumi.set(__self__, "path", path)
82
+ if tune is not None:
83
+ pulumi.set(__self__, "tune", tune)
84
+ if verbose_logging is not None:
85
+ pulumi.set(__self__, "verbose_logging", verbose_logging)
86
+
87
+ @_builtins.property
88
+ @pulumi.getter(name="acsUrls")
89
+ def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
90
+ """
91
+ The well-formatted URLs of your Assertion Consumer Service (ACS)
92
+ that should receive a response from the identity provider.
93
+ """
94
+ return pulumi.get(self, "acs_urls")
95
+
96
+ @acs_urls.setter
97
+ def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
98
+ pulumi.set(self, "acs_urls", value)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter(name="entityId")
102
+ def entity_id(self) -> pulumi.Input[_builtins.str]:
103
+ """
104
+ The entity ID of the SAML authentication service provider.
105
+ """
106
+ return pulumi.get(self, "entity_id")
107
+
108
+ @entity_id.setter
109
+ def entity_id(self, value: pulumi.Input[_builtins.str]):
110
+ pulumi.set(self, "entity_id", value)
111
+
112
+ @_builtins.property
113
+ @pulumi.getter(name="defaultRole")
114
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
115
+ """
116
+ The role to use if no role is provided during login.
117
+ """
118
+ return pulumi.get(self, "default_role")
119
+
120
+ @default_role.setter
121
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
122
+ pulumi.set(self, "default_role", value)
123
+
124
+ @_builtins.property
125
+ @pulumi.getter(name="disableRemount")
126
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
127
+ """
128
+ If set to `true`, opts out of mount migration on path updates.
129
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
130
+ """
131
+ return pulumi.get(self, "disable_remount")
132
+
133
+ @disable_remount.setter
134
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
135
+ pulumi.set(self, "disable_remount", value)
136
+
137
+ @_builtins.property
138
+ @pulumi.getter(name="idpCert")
139
+ def idp_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
140
+ """
141
+ The PEM encoded certificate of the identity provider. Mutually exclusive
142
+ with `idp_metadata_url`.
143
+ """
144
+ return pulumi.get(self, "idp_cert")
145
+
146
+ @idp_cert.setter
147
+ def idp_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
148
+ pulumi.set(self, "idp_cert", value)
149
+
150
+ @_builtins.property
151
+ @pulumi.getter(name="idpEntityId")
152
+ def idp_entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
153
+ """
154
+ The entity ID of the identity provider. Mutually exclusive with
155
+ `idp_metadata_url`.
156
+ """
157
+ return pulumi.get(self, "idp_entity_id")
158
+
159
+ @idp_entity_id.setter
160
+ def idp_entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
161
+ pulumi.set(self, "idp_entity_id", value)
162
+
163
+ @_builtins.property
164
+ @pulumi.getter(name="idpMetadataUrl")
165
+ def idp_metadata_url(self) -> Optional[pulumi.Input[_builtins.str]]:
166
+ """
167
+ The metadata URL of the identity provider.
168
+ """
169
+ return pulumi.get(self, "idp_metadata_url")
170
+
171
+ @idp_metadata_url.setter
172
+ def idp_metadata_url(self, value: Optional[pulumi.Input[_builtins.str]]):
173
+ pulumi.set(self, "idp_metadata_url", value)
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="idpSsoUrl")
177
+ def idp_sso_url(self) -> Optional[pulumi.Input[_builtins.str]]:
178
+ """
179
+ The SSO URL of the identity provider. Mutually exclusive with
180
+ `idp_metadata_url`.
181
+ """
182
+ return pulumi.get(self, "idp_sso_url")
183
+
184
+ @idp_sso_url.setter
185
+ def idp_sso_url(self, value: Optional[pulumi.Input[_builtins.str]]):
186
+ pulumi.set(self, "idp_sso_url", value)
187
+
188
+ @_builtins.property
189
+ @pulumi.getter
190
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
191
+ """
192
+ The namespace to provision the resource in.
193
+ The value should not contain leading or trailing forward slashes.
194
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
195
+ *Available only for Vault Enterprise*.
196
+ """
197
+ return pulumi.get(self, "namespace")
198
+
199
+ @namespace.setter
200
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
201
+ pulumi.set(self, "namespace", value)
202
+
203
+ @_builtins.property
204
+ @pulumi.getter
205
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
206
+ """
207
+ Path where the auth backend will be mounted. Defaults to `auth/saml`
208
+ if not specified.
209
+ """
210
+ return pulumi.get(self, "path")
211
+
212
+ @path.setter
213
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
214
+ pulumi.set(self, "path", value)
215
+
216
+ @_builtins.property
217
+ @pulumi.getter
218
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
219
+ """
220
+ Extra configuration block. Structure is documented below.
221
+
222
+ The `tune` block is used to tune the auth backend:
223
+ """
224
+ return pulumi.get(self, "tune")
225
+
226
+ @tune.setter
227
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
228
+ pulumi.set(self, "tune", value)
229
+
230
+ @_builtins.property
231
+ @pulumi.getter(name="verboseLogging")
232
+ def verbose_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
233
+ """
234
+ If set to `true`, logs additional, potentially sensitive
235
+ information during the SAML exchange according to the current logging level. Not
236
+ recommended for production.
237
+ """
238
+ return pulumi.get(self, "verbose_logging")
239
+
240
+ @verbose_logging.setter
241
+ def verbose_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
242
+ pulumi.set(self, "verbose_logging", value)
243
+
244
+
245
+ @pulumi.input_type
246
+ class _AuthBackendState:
247
+ def __init__(__self__, *,
248
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
249
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
250
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
251
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
252
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
253
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
254
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
255
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
256
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
257
+ path: Optional[pulumi.Input[_builtins.str]] = None,
258
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
259
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None):
260
+ """
261
+ Input properties used for looking up and filtering AuthBackend resources.
262
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
263
+ that should receive a response from the identity provider.
264
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
265
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
266
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
267
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
268
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
269
+ with `idp_metadata_url`.
270
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
271
+ `idp_metadata_url`.
272
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
273
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
274
+ `idp_metadata_url`.
275
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
276
+ The value should not contain leading or trailing forward slashes.
277
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
278
+ *Available only for Vault Enterprise*.
279
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
280
+ if not specified.
281
+ :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
282
+
283
+ The `tune` block is used to tune the auth backend:
284
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
285
+ information during the SAML exchange according to the current logging level. Not
286
+ recommended for production.
287
+ """
288
+ if acs_urls is not None:
289
+ pulumi.set(__self__, "acs_urls", acs_urls)
290
+ if default_role is not None:
291
+ pulumi.set(__self__, "default_role", default_role)
292
+ if disable_remount is not None:
293
+ pulumi.set(__self__, "disable_remount", disable_remount)
294
+ if entity_id is not None:
295
+ pulumi.set(__self__, "entity_id", entity_id)
296
+ if idp_cert is not None:
297
+ pulumi.set(__self__, "idp_cert", idp_cert)
298
+ if idp_entity_id is not None:
299
+ pulumi.set(__self__, "idp_entity_id", idp_entity_id)
300
+ if idp_metadata_url is not None:
301
+ pulumi.set(__self__, "idp_metadata_url", idp_metadata_url)
302
+ if idp_sso_url is not None:
303
+ pulumi.set(__self__, "idp_sso_url", idp_sso_url)
304
+ if namespace is not None:
305
+ pulumi.set(__self__, "namespace", namespace)
306
+ if path is not None:
307
+ pulumi.set(__self__, "path", path)
308
+ if tune is not None:
309
+ pulumi.set(__self__, "tune", tune)
310
+ if verbose_logging is not None:
311
+ pulumi.set(__self__, "verbose_logging", verbose_logging)
312
+
313
+ @_builtins.property
314
+ @pulumi.getter(name="acsUrls")
315
+ def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
316
+ """
317
+ The well-formatted URLs of your Assertion Consumer Service (ACS)
318
+ that should receive a response from the identity provider.
319
+ """
320
+ return pulumi.get(self, "acs_urls")
321
+
322
+ @acs_urls.setter
323
+ def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
324
+ pulumi.set(self, "acs_urls", value)
325
+
326
+ @_builtins.property
327
+ @pulumi.getter(name="defaultRole")
328
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
329
+ """
330
+ The role to use if no role is provided during login.
331
+ """
332
+ return pulumi.get(self, "default_role")
333
+
334
+ @default_role.setter
335
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
336
+ pulumi.set(self, "default_role", value)
337
+
338
+ @_builtins.property
339
+ @pulumi.getter(name="disableRemount")
340
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
341
+ """
342
+ If set to `true`, opts out of mount migration on path updates.
343
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
344
+ """
345
+ return pulumi.get(self, "disable_remount")
346
+
347
+ @disable_remount.setter
348
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
349
+ pulumi.set(self, "disable_remount", value)
350
+
351
+ @_builtins.property
352
+ @pulumi.getter(name="entityId")
353
+ def entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
354
+ """
355
+ The entity ID of the SAML authentication service provider.
356
+ """
357
+ return pulumi.get(self, "entity_id")
358
+
359
+ @entity_id.setter
360
+ def entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
361
+ pulumi.set(self, "entity_id", value)
362
+
363
+ @_builtins.property
364
+ @pulumi.getter(name="idpCert")
365
+ def idp_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
366
+ """
367
+ The PEM encoded certificate of the identity provider. Mutually exclusive
368
+ with `idp_metadata_url`.
369
+ """
370
+ return pulumi.get(self, "idp_cert")
371
+
372
+ @idp_cert.setter
373
+ def idp_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
374
+ pulumi.set(self, "idp_cert", value)
375
+
376
+ @_builtins.property
377
+ @pulumi.getter(name="idpEntityId")
378
+ def idp_entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
379
+ """
380
+ The entity ID of the identity provider. Mutually exclusive with
381
+ `idp_metadata_url`.
382
+ """
383
+ return pulumi.get(self, "idp_entity_id")
384
+
385
+ @idp_entity_id.setter
386
+ def idp_entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
387
+ pulumi.set(self, "idp_entity_id", value)
388
+
389
+ @_builtins.property
390
+ @pulumi.getter(name="idpMetadataUrl")
391
+ def idp_metadata_url(self) -> Optional[pulumi.Input[_builtins.str]]:
392
+ """
393
+ The metadata URL of the identity provider.
394
+ """
395
+ return pulumi.get(self, "idp_metadata_url")
396
+
397
+ @idp_metadata_url.setter
398
+ def idp_metadata_url(self, value: Optional[pulumi.Input[_builtins.str]]):
399
+ pulumi.set(self, "idp_metadata_url", value)
400
+
401
+ @_builtins.property
402
+ @pulumi.getter(name="idpSsoUrl")
403
+ def idp_sso_url(self) -> Optional[pulumi.Input[_builtins.str]]:
404
+ """
405
+ The SSO URL of the identity provider. Mutually exclusive with
406
+ `idp_metadata_url`.
407
+ """
408
+ return pulumi.get(self, "idp_sso_url")
409
+
410
+ @idp_sso_url.setter
411
+ def idp_sso_url(self, value: Optional[pulumi.Input[_builtins.str]]):
412
+ pulumi.set(self, "idp_sso_url", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter
416
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
417
+ """
418
+ The namespace to provision the resource in.
419
+ The value should not contain leading or trailing forward slashes.
420
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
421
+ *Available only for Vault Enterprise*.
422
+ """
423
+ return pulumi.get(self, "namespace")
424
+
425
+ @namespace.setter
426
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
427
+ pulumi.set(self, "namespace", value)
428
+
429
+ @_builtins.property
430
+ @pulumi.getter
431
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
432
+ """
433
+ Path where the auth backend will be mounted. Defaults to `auth/saml`
434
+ if not specified.
435
+ """
436
+ return pulumi.get(self, "path")
437
+
438
+ @path.setter
439
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
440
+ pulumi.set(self, "path", value)
441
+
442
+ @_builtins.property
443
+ @pulumi.getter
444
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
445
+ """
446
+ Extra configuration block. Structure is documented below.
447
+
448
+ The `tune` block is used to tune the auth backend:
449
+ """
450
+ return pulumi.get(self, "tune")
451
+
452
+ @tune.setter
453
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
454
+ pulumi.set(self, "tune", value)
455
+
456
+ @_builtins.property
457
+ @pulumi.getter(name="verboseLogging")
458
+ def verbose_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
459
+ """
460
+ If set to `true`, logs additional, potentially sensitive
461
+ information during the SAML exchange according to the current logging level. Not
462
+ recommended for production.
463
+ """
464
+ return pulumi.get(self, "verbose_logging")
465
+
466
+ @verbose_logging.setter
467
+ def verbose_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
468
+ pulumi.set(self, "verbose_logging", value)
469
+
470
+
471
+ @pulumi.type_token("vault:saml/authBackend:AuthBackend")
472
+ class AuthBackend(pulumi.CustomResource):
473
+ @overload
474
+ def __init__(__self__,
475
+ resource_name: str,
476
+ opts: Optional[pulumi.ResourceOptions] = None,
477
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
478
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
479
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
480
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
481
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
482
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
483
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
484
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
485
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
486
+ path: Optional[pulumi.Input[_builtins.str]] = None,
487
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
488
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None,
489
+ __props__=None):
490
+ """
491
+ Manages a SAML Auth mount in a Vault server. See the [Vault
492
+ documentation](https://www.vaultproject.io/docs/auth/saml/) for more
493
+ information.
494
+
495
+ ## Example Usage
496
+
497
+ ```python
498
+ import pulumi
499
+ import pulumi_vault as vault
500
+
501
+ test = vault.saml.AuthBackend("test",
502
+ path="saml",
503
+ idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
504
+ entity_id="https://my.vault/v1/auth/saml",
505
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
506
+ default_role="admin")
507
+ ```
508
+
509
+ ## Import
510
+
511
+ SAML authentication mounts can be imported using the `path`, e.g.
512
+
513
+ ```sh
514
+ $ pulumi import vault:saml/authBackend:AuthBackend example saml
515
+ ```
516
+
517
+ :param str resource_name: The name of the resource.
518
+ :param pulumi.ResourceOptions opts: Options for the resource.
519
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
520
+ that should receive a response from the identity provider.
521
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
522
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
523
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
524
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
525
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
526
+ with `idp_metadata_url`.
527
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
528
+ `idp_metadata_url`.
529
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
530
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
531
+ `idp_metadata_url`.
532
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
533
+ The value should not contain leading or trailing forward slashes.
534
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
535
+ *Available only for Vault Enterprise*.
536
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
537
+ if not specified.
538
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
539
+
540
+ The `tune` block is used to tune the auth backend:
541
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
542
+ information during the SAML exchange according to the current logging level. Not
543
+ recommended for production.
544
+ """
545
+ ...
546
+ @overload
547
+ def __init__(__self__,
548
+ resource_name: str,
549
+ args: AuthBackendArgs,
550
+ opts: Optional[pulumi.ResourceOptions] = None):
551
+ """
552
+ Manages a SAML Auth mount in a Vault server. See the [Vault
553
+ documentation](https://www.vaultproject.io/docs/auth/saml/) for more
554
+ information.
555
+
556
+ ## Example Usage
557
+
558
+ ```python
559
+ import pulumi
560
+ import pulumi_vault as vault
561
+
562
+ test = vault.saml.AuthBackend("test",
563
+ path="saml",
564
+ idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
565
+ entity_id="https://my.vault/v1/auth/saml",
566
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
567
+ default_role="admin")
568
+ ```
569
+
570
+ ## Import
571
+
572
+ SAML authentication mounts can be imported using the `path`, e.g.
573
+
574
+ ```sh
575
+ $ pulumi import vault:saml/authBackend:AuthBackend example saml
576
+ ```
577
+
578
+ :param str resource_name: The name of the resource.
579
+ :param AuthBackendArgs args: The arguments to use to populate this resource's properties.
580
+ :param pulumi.ResourceOptions opts: Options for the resource.
581
+ """
582
+ ...
583
+ def __init__(__self__, resource_name: str, *args, **kwargs):
584
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
585
+ if resource_args is not None:
586
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
587
+ else:
588
+ __self__._internal_init(resource_name, *args, **kwargs)
589
+
590
+ def _internal_init(__self__,
591
+ resource_name: str,
592
+ opts: Optional[pulumi.ResourceOptions] = None,
593
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
594
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
595
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
596
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
597
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
598
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
599
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
600
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
601
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
602
+ path: Optional[pulumi.Input[_builtins.str]] = None,
603
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
604
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None,
605
+ __props__=None):
606
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
607
+ if not isinstance(opts, pulumi.ResourceOptions):
608
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
609
+ if opts.id is None:
610
+ if __props__ is not None:
611
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
612
+ __props__ = AuthBackendArgs.__new__(AuthBackendArgs)
613
+
614
+ if acs_urls is None and not opts.urn:
615
+ raise TypeError("Missing required property 'acs_urls'")
616
+ __props__.__dict__["acs_urls"] = acs_urls
617
+ __props__.__dict__["default_role"] = default_role
618
+ __props__.__dict__["disable_remount"] = disable_remount
619
+ if entity_id is None and not opts.urn:
620
+ raise TypeError("Missing required property 'entity_id'")
621
+ __props__.__dict__["entity_id"] = entity_id
622
+ __props__.__dict__["idp_cert"] = idp_cert
623
+ __props__.__dict__["idp_entity_id"] = idp_entity_id
624
+ __props__.__dict__["idp_metadata_url"] = idp_metadata_url
625
+ __props__.__dict__["idp_sso_url"] = idp_sso_url
626
+ __props__.__dict__["namespace"] = namespace
627
+ __props__.__dict__["path"] = path
628
+ __props__.__dict__["tune"] = tune
629
+ __props__.__dict__["verbose_logging"] = verbose_logging
630
+ super(AuthBackend, __self__).__init__(
631
+ 'vault:saml/authBackend:AuthBackend',
632
+ resource_name,
633
+ __props__,
634
+ opts)
635
+
636
+ @staticmethod
637
+ def get(resource_name: str,
638
+ id: pulumi.Input[str],
639
+ opts: Optional[pulumi.ResourceOptions] = None,
640
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
641
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
642
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
643
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
644
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
645
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
646
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
647
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
648
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
649
+ path: Optional[pulumi.Input[_builtins.str]] = None,
650
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
651
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackend':
652
+ """
653
+ Get an existing AuthBackend resource's state with the given name, id, and optional extra
654
+ properties used to qualify the lookup.
655
+
656
+ :param str resource_name: The unique name of the resulting resource.
657
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
658
+ :param pulumi.ResourceOptions opts: Options for the resource.
659
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
660
+ that should receive a response from the identity provider.
661
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
662
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
663
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
664
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
665
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
666
+ with `idp_metadata_url`.
667
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
668
+ `idp_metadata_url`.
669
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
670
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
671
+ `idp_metadata_url`.
672
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
673
+ The value should not contain leading or trailing forward slashes.
674
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
675
+ *Available only for Vault Enterprise*.
676
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
677
+ if not specified.
678
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
679
+
680
+ The `tune` block is used to tune the auth backend:
681
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
682
+ information during the SAML exchange according to the current logging level. Not
683
+ recommended for production.
684
+ """
685
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
686
+
687
+ __props__ = _AuthBackendState.__new__(_AuthBackendState)
688
+
689
+ __props__.__dict__["acs_urls"] = acs_urls
690
+ __props__.__dict__["default_role"] = default_role
691
+ __props__.__dict__["disable_remount"] = disable_remount
692
+ __props__.__dict__["entity_id"] = entity_id
693
+ __props__.__dict__["idp_cert"] = idp_cert
694
+ __props__.__dict__["idp_entity_id"] = idp_entity_id
695
+ __props__.__dict__["idp_metadata_url"] = idp_metadata_url
696
+ __props__.__dict__["idp_sso_url"] = idp_sso_url
697
+ __props__.__dict__["namespace"] = namespace
698
+ __props__.__dict__["path"] = path
699
+ __props__.__dict__["tune"] = tune
700
+ __props__.__dict__["verbose_logging"] = verbose_logging
701
+ return AuthBackend(resource_name, opts=opts, __props__=__props__)
702
+
703
+ @_builtins.property
704
+ @pulumi.getter(name="acsUrls")
705
+ def acs_urls(self) -> pulumi.Output[Sequence[_builtins.str]]:
706
+ """
707
+ The well-formatted URLs of your Assertion Consumer Service (ACS)
708
+ that should receive a response from the identity provider.
709
+ """
710
+ return pulumi.get(self, "acs_urls")
711
+
712
+ @_builtins.property
713
+ @pulumi.getter(name="defaultRole")
714
+ def default_role(self) -> pulumi.Output[Optional[_builtins.str]]:
715
+ """
716
+ The role to use if no role is provided during login.
717
+ """
718
+ return pulumi.get(self, "default_role")
719
+
720
+ @_builtins.property
721
+ @pulumi.getter(name="disableRemount")
722
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
723
+ """
724
+ If set to `true`, opts out of mount migration on path updates.
725
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
726
+ """
727
+ return pulumi.get(self, "disable_remount")
728
+
729
+ @_builtins.property
730
+ @pulumi.getter(name="entityId")
731
+ def entity_id(self) -> pulumi.Output[_builtins.str]:
732
+ """
733
+ The entity ID of the SAML authentication service provider.
734
+ """
735
+ return pulumi.get(self, "entity_id")
736
+
737
+ @_builtins.property
738
+ @pulumi.getter(name="idpCert")
739
+ def idp_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
740
+ """
741
+ The PEM encoded certificate of the identity provider. Mutually exclusive
742
+ with `idp_metadata_url`.
743
+ """
744
+ return pulumi.get(self, "idp_cert")
745
+
746
+ @_builtins.property
747
+ @pulumi.getter(name="idpEntityId")
748
+ def idp_entity_id(self) -> pulumi.Output[Optional[_builtins.str]]:
749
+ """
750
+ The entity ID of the identity provider. Mutually exclusive with
751
+ `idp_metadata_url`.
752
+ """
753
+ return pulumi.get(self, "idp_entity_id")
754
+
755
+ @_builtins.property
756
+ @pulumi.getter(name="idpMetadataUrl")
757
+ def idp_metadata_url(self) -> pulumi.Output[Optional[_builtins.str]]:
758
+ """
759
+ The metadata URL of the identity provider.
760
+ """
761
+ return pulumi.get(self, "idp_metadata_url")
762
+
763
+ @_builtins.property
764
+ @pulumi.getter(name="idpSsoUrl")
765
+ def idp_sso_url(self) -> pulumi.Output[Optional[_builtins.str]]:
766
+ """
767
+ The SSO URL of the identity provider. Mutually exclusive with
768
+ `idp_metadata_url`.
769
+ """
770
+ return pulumi.get(self, "idp_sso_url")
771
+
772
+ @_builtins.property
773
+ @pulumi.getter
774
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
775
+ """
776
+ The namespace to provision the resource in.
777
+ The value should not contain leading or trailing forward slashes.
778
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
779
+ *Available only for Vault Enterprise*.
780
+ """
781
+ return pulumi.get(self, "namespace")
782
+
783
+ @_builtins.property
784
+ @pulumi.getter
785
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
786
+ """
787
+ Path where the auth backend will be mounted. Defaults to `auth/saml`
788
+ if not specified.
789
+ """
790
+ return pulumi.get(self, "path")
791
+
792
+ @_builtins.property
793
+ @pulumi.getter
794
+ def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
795
+ """
796
+ Extra configuration block. Structure is documented below.
797
+
798
+ The `tune` block is used to tune the auth backend:
799
+ """
800
+ return pulumi.get(self, "tune")
801
+
802
+ @_builtins.property
803
+ @pulumi.getter(name="verboseLogging")
804
+ def verbose_logging(self) -> pulumi.Output[_builtins.bool]:
805
+ """
806
+ If set to `true`, logs additional, potentially sensitive
807
+ information during the SAML exchange according to the current logging level. Not
808
+ recommended for production.
809
+ """
810
+ return pulumi.get(self, "verbose_logging")
811
+