akamai.AppSecIPGeo
Scopes: Security policy
Modifies the method used for firewall blocking, and manages the network lists used for IP/Geo firewall blocking.
Related API Endpoint: /appsec/v1/configs/{configId}/versions/{versionNumber}/security-policies/{policyId}/ip-geo-firewall
Example Usage
Basic usage
using System.Collections.Generic;
using Pulumi;
using Akamai = Pulumi.Akamai;
return await Deployment.RunAsync(() =>
{
var configuration = Akamai.GetAppSecConfiguration.Invoke(new()
{
Name = "Documentation",
});
var ipGeoBlock = new Akamai.AppSecIPGeo("ipGeoBlock", new()
{
ConfigId = configuration.Apply(getAppSecConfigurationResult => getAppSecConfigurationResult.ConfigId),
SecurityPolicyId = "gms1_134637",
Mode = "block",
GeoNetworkLists = new[]
{
"06038_GEO_TEST",
},
IpNetworkLists = new[]
{
"56921_TEST",
},
ExceptionIpNetworkLists = new[]
{
"07126_EXCEPTION_TEST",
},
});
// USE CASE: User wants to update the IP/Geo firewall mode and update the exception list.
var ipGeoAllow = new Akamai.AppSecIPGeo("ipGeoAllow", new()
{
ConfigId = configuration.Apply(getAppSecConfigurationResult => getAppSecConfigurationResult.ConfigId),
SecurityPolicyId = "gms1-090334",
Mode = "allow",
ExceptionIpNetworkLists = new[]
{
"07126_EXCEPTION_TEST",
},
});
return new Dictionary<string, object?>
{
["ipGeoModeBlock"] = ipGeoBlock.Mode,
["blockGeoNetworkLists"] = ipGeoBlock.GeoNetworkLists,
["blockIpNetworkLists"] = ipGeoBlock.IpNetworkLists,
["blockExceptionIpNetworkLists"] = ipGeoBlock.ExceptionIpNetworkLists,
["ipGeoModeAllow"] = ipGeoAllow.Mode,
["allowExceptionIpNetworkLists"] = ipGeoAllow.ExceptionIpNetworkLists,
};
});
package main
import (
"github.com/pulumi/pulumi-akamai/sdk/v4/go/akamai"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
configuration, err := akamai.LookupAppSecConfiguration(ctx, &akamai.LookupAppSecConfigurationArgs{
Name: pulumi.StringRef("Documentation"),
}, nil)
if err != nil {
return err
}
ipGeoBlock, err := akamai.NewAppSecIPGeo(ctx, "ipGeoBlock", &akamai.AppSecIPGeoArgs{
ConfigId: *pulumi.Int(configuration.ConfigId),
SecurityPolicyId: pulumi.String("gms1_134637"),
Mode: pulumi.String("block"),
GeoNetworkLists: pulumi.StringArray{
pulumi.String("06038_GEO_TEST"),
},
IpNetworkLists: pulumi.StringArray{
pulumi.String("56921_TEST"),
},
ExceptionIpNetworkLists: pulumi.StringArray{
pulumi.String("07126_EXCEPTION_TEST"),
},
})
if err != nil {
return err
}
ipGeoAllow, err := akamai.NewAppSecIPGeo(ctx, "ipGeoAllow", &akamai.AppSecIPGeoArgs{
ConfigId: *pulumi.Int(configuration.ConfigId),
SecurityPolicyId: pulumi.String("gms1-090334"),
Mode: pulumi.String("allow"),
ExceptionIpNetworkLists: pulumi.StringArray{
pulumi.String("07126_EXCEPTION_TEST"),
},
})
if err != nil {
return err
}
ctx.Export("ipGeoModeBlock", ipGeoBlock.Mode)
ctx.Export("blockGeoNetworkLists", ipGeoBlock.GeoNetworkLists)
ctx.Export("blockIpNetworkLists", ipGeoBlock.IpNetworkLists)
ctx.Export("blockExceptionIpNetworkLists", ipGeoBlock.ExceptionIpNetworkLists)
ctx.Export("ipGeoModeAllow", ipGeoAllow.Mode)
ctx.Export("allowExceptionIpNetworkLists", ipGeoAllow.ExceptionIpNetworkLists)
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.akamai.AkamaiFunctions;
import com.pulumi.akamai.inputs.GetAppSecConfigurationArgs;
import com.pulumi.akamai.AppSecIPGeo;
import com.pulumi.akamai.AppSecIPGeoArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var configuration = AkamaiFunctions.getAppSecConfiguration(GetAppSecConfigurationArgs.builder()
.name("Documentation")
.build());
var ipGeoBlock = new AppSecIPGeo("ipGeoBlock", AppSecIPGeoArgs.builder()
.configId(configuration.applyValue(getAppSecConfigurationResult -> getAppSecConfigurationResult.configId()))
.securityPolicyId("gms1_134637")
.mode("block")
.geoNetworkLists("06038_GEO_TEST")
.ipNetworkLists("56921_TEST")
.exceptionIpNetworkLists("07126_EXCEPTION_TEST")
.build());
var ipGeoAllow = new AppSecIPGeo("ipGeoAllow", AppSecIPGeoArgs.builder()
.configId(configuration.applyValue(getAppSecConfigurationResult -> getAppSecConfigurationResult.configId()))
.securityPolicyId("gms1-090334")
.mode("allow")
.exceptionIpNetworkLists("07126_EXCEPTION_TEST")
.build());
ctx.export("ipGeoModeBlock", ipGeoBlock.mode());
ctx.export("blockGeoNetworkLists", ipGeoBlock.geoNetworkLists());
ctx.export("blockIpNetworkLists", ipGeoBlock.ipNetworkLists());
ctx.export("blockExceptionIpNetworkLists", ipGeoBlock.exceptionIpNetworkLists());
ctx.export("ipGeoModeAllow", ipGeoAllow.mode());
ctx.export("allowExceptionIpNetworkLists", ipGeoAllow.exceptionIpNetworkLists());
}
}
import pulumi
import pulumi_akamai as akamai
configuration = akamai.get_app_sec_configuration(name="Documentation")
ip_geo_block = akamai.AppSecIPGeo("ipGeoBlock",
config_id=configuration.config_id,
security_policy_id="gms1_134637",
mode="block",
geo_network_lists=["06038_GEO_TEST"],
ip_network_lists=["56921_TEST"],
exception_ip_network_lists=["07126_EXCEPTION_TEST"])
# USE CASE: User wants to update the IP/Geo firewall mode and update the exception list.
ip_geo_allow = akamai.AppSecIPGeo("ipGeoAllow",
config_id=configuration.config_id,
security_policy_id="gms1-090334",
mode="allow",
exception_ip_network_lists=["07126_EXCEPTION_TEST"])
pulumi.export("ipGeoModeBlock", ip_geo_block.mode)
pulumi.export("blockGeoNetworkLists", ip_geo_block.geo_network_lists)
pulumi.export("blockIpNetworkLists", ip_geo_block.ip_network_lists)
pulumi.export("blockExceptionIpNetworkLists", ip_geo_block.exception_ip_network_lists)
pulumi.export("ipGeoModeAllow", ip_geo_allow.mode)
pulumi.export("allowExceptionIpNetworkLists", ip_geo_allow.exception_ip_network_lists)
import * as pulumi from "@pulumi/pulumi";
import * as akamai from "@pulumi/akamai";
const configuration = akamai.getAppSecConfiguration({
name: "Documentation",
});
const ipGeoBlock = new akamai.AppSecIPGeo("ipGeoBlock", {
configId: configuration.then(configuration => configuration.configId),
securityPolicyId: "gms1_134637",
mode: "block",
geoNetworkLists: ["06038_GEO_TEST"],
ipNetworkLists: ["56921_TEST"],
exceptionIpNetworkLists: ["07126_EXCEPTION_TEST"],
});
// USE CASE: User wants to update the IP/Geo firewall mode and update the exception list.
const ipGeoAllow = new akamai.AppSecIPGeo("ipGeoAllow", {
configId: configuration.then(configuration => configuration.configId),
securityPolicyId: "gms1-090334",
mode: "allow",
exceptionIpNetworkLists: ["07126_EXCEPTION_TEST"],
});
export const ipGeoModeBlock = ipGeoBlock.mode;
export const blockGeoNetworkLists = ipGeoBlock.geoNetworkLists;
export const blockIpNetworkLists = ipGeoBlock.ipNetworkLists;
export const blockExceptionIpNetworkLists = ipGeoBlock.exceptionIpNetworkLists;
export const ipGeoModeAllow = ipGeoAllow.mode;
export const allowExceptionIpNetworkLists = ipGeoAllow.exceptionIpNetworkLists;
resources:
ipGeoBlock: # USE CASE: User wants to update the IP/Geo firewall mode and update the exception list.
type: akamai:AppSecIPGeo
properties:
configId: ${configuration.configId}
securityPolicyId: gms1_134637
mode: block
geoNetworkLists:
- 06038_GEO_TEST
ipNetworkLists:
- 56921_TEST
exceptionIpNetworkLists:
- 07126_EXCEPTION_TEST
ipGeoAllow:
type: akamai:AppSecIPGeo
properties:
configId: ${configuration.configId}
securityPolicyId: gms1-090334
mode: allow
exceptionIpNetworkLists:
- 07126_EXCEPTION_TEST
variables:
configuration: # USE CASE: User wants to update the IP/Geo firewall mode, and update the IP, geographic, and exception lists.
fn::invoke:
Function: akamai:getAppSecConfiguration
Arguments:
name: Documentation
outputs:
ipGeoModeBlock: ${ipGeoBlock.mode}
blockGeoNetworkLists: ${ipGeoBlock.geoNetworkLists}
blockIpNetworkLists: ${ipGeoBlock.ipNetworkLists}
blockExceptionIpNetworkLists: ${ipGeoBlock.exceptionIpNetworkLists}
ipGeoModeAllow: ${ipGeoAllow.mode}
allowExceptionIpNetworkLists: ${ipGeoAllow.exceptionIpNetworkLists}
Create AppSecIPGeo Resource
new AppSecIPGeo(name: string, args: AppSecIPGeoArgs, opts?: CustomResourceOptions);
@overload
def AppSecIPGeo(resource_name: str,
opts: Optional[ResourceOptions] = None,
config_id: Optional[int] = None,
exception_ip_network_lists: Optional[Sequence[str]] = None,
geo_network_lists: Optional[Sequence[str]] = None,
ip_network_lists: Optional[Sequence[str]] = None,
mode: Optional[str] = None,
security_policy_id: Optional[str] = None)
@overload
def AppSecIPGeo(resource_name: str,
args: AppSecIPGeoArgs,
opts: Optional[ResourceOptions] = None)
func NewAppSecIPGeo(ctx *Context, name string, args AppSecIPGeoArgs, opts ...ResourceOption) (*AppSecIPGeo, error)
public AppSecIPGeo(string name, AppSecIPGeoArgs args, CustomResourceOptions? opts = null)
public AppSecIPGeo(String name, AppSecIPGeoArgs args)
public AppSecIPGeo(String name, AppSecIPGeoArgs args, CustomResourceOptions options)
type: akamai:AppSecIPGeo
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AppSecIPGeoArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AppSecIPGeoArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AppSecIPGeoArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AppSecIPGeoArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AppSecIPGeoArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
AppSecIPGeo Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The AppSecIPGeo resource accepts the following input properties:
- Config
Id int . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- Mode string
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- Security
Policy stringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- Exception
Ip List<string>Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- Geo
Network List<string>Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- Ip
Network List<string>Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.
- Config
Id int . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- Mode string
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- Security
Policy stringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- Exception
Ip []stringNetwork Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- Geo
Network []stringLists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- Ip
Network []stringLists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.
- config
Id Integer . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- mode String
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security
Policy StringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- exception
Ip List<String>Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo
Network List<String>Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip
Network List<String>Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.
- config
Id number . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- mode string
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security
Policy stringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- exception
Ip string[]Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo
Network string[]Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip
Network string[]Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.
- config_
id int . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- mode str
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security_
policy_ strid . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- exception_
ip_ Sequence[str]network_ lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo_
network_ Sequence[str]lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip_
network_ Sequence[str]lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.
- config
Id Number . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- mode String
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security
Policy StringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- exception
Ip List<String>Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo
Network List<String>Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip
Network List<String>Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.
Outputs
All input properties are implicitly available as output properties. Additionally, the AppSecIPGeo resource produces the following output properties:
- Id string
The provider-assigned unique ID for this managed resource.
- Id string
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
- id string
The provider-assigned unique ID for this managed resource.
- id str
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
Look up Existing AppSecIPGeo Resource
Get an existing AppSecIPGeo resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AppSecIPGeoState, opts?: CustomResourceOptions): AppSecIPGeo
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
config_id: Optional[int] = None,
exception_ip_network_lists: Optional[Sequence[str]] = None,
geo_network_lists: Optional[Sequence[str]] = None,
ip_network_lists: Optional[Sequence[str]] = None,
mode: Optional[str] = None,
security_policy_id: Optional[str] = None) -> AppSecIPGeo
func GetAppSecIPGeo(ctx *Context, name string, id IDInput, state *AppSecIPGeoState, opts ...ResourceOption) (*AppSecIPGeo, error)
public static AppSecIPGeo Get(string name, Input<string> id, AppSecIPGeoState? state, CustomResourceOptions? opts = null)
public static AppSecIPGeo get(String name, Output<String> id, AppSecIPGeoState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Config
Id int . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- Exception
Ip List<string>Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- Geo
Network List<string>Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- Ip
Network List<string>Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- Mode string
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- Security
Policy stringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- Config
Id int . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- Exception
Ip []stringNetwork Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- Geo
Network []stringLists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- Ip
Network []stringLists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- Mode string
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- Security
Policy stringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- config
Id Integer . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- exception
Ip List<String>Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo
Network List<String>Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip
Network List<String>Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- mode String
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security
Policy StringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- config
Id number . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- exception
Ip string[]Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo
Network string[]Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip
Network string[]Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- mode string
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security
Policy stringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- config_
id int . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- exception_
ip_ Sequence[str]network_ lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo_
network_ Sequence[str]lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip_
network_ Sequence[str]lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- mode str
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security_
policy_ strid . Unique identifier of the security policy associated with the IP/Geo lists being modified.
- config
Id Number . Unique identifier of the security configuration associated with the IP/Geo lists being modified.
- exception
Ip List<String>Network Lists . JSON array of network lists that are always allowed to pass through the firewall, regardless of the value of any other setting.
- geo
Network List<String>Lists . JSON array of geographic network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- ip
Network List<String>Lists . JSON array of IP network lists that, depending on the value of the
mode
argument, will be blocked or allowed through the firewall.- mode String
. Set to block to prevent the specified network lists from being allowed through the firewall: all other entities will be allowed to pass through the firewall. Set to allow to allow the specified network lists to pass through the firewall; all other entities will be prevented from passing through the firewall.
- security
Policy StringId . Unique identifier of the security policy associated with the IP/Geo lists being modified.
Package Details
- Repository
- Akamai pulumi/pulumi-akamai
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
akamai
Terraform Provider.