akeyless.AuthMethodLdap
Explore with Pulumi AI
LDAP Auth Method Resource
Create AuthMethodLdap Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AuthMethodLdap(name: string, args?: AuthMethodLdapArgs, opts?: CustomResourceOptions);
@overload
def AuthMethodLdap(resource_name: str,
args: Optional[AuthMethodLdapArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def AuthMethodLdap(resource_name: str,
opts: Optional[ResourceOptions] = None,
access_expires: Optional[float] = None,
audit_logs_claims: Optional[Sequence[str]] = None,
auth_method_ldap_id: Optional[str] = None,
bound_ips: Optional[Sequence[str]] = None,
delete_protection: Optional[str] = None,
description: Optional[str] = None,
expiration_event_ins: Optional[Sequence[str]] = None,
force_sub_claims: Optional[bool] = None,
gen_key: Optional[str] = None,
gw_bound_ips: Optional[Sequence[str]] = None,
jwt_ttl: Optional[float] = None,
name: Optional[str] = None,
product_types: Optional[Sequence[str]] = None,
public_key_data: Optional[str] = None,
unique_identifier: Optional[str] = None)
func NewAuthMethodLdap(ctx *Context, name string, args *AuthMethodLdapArgs, opts ...ResourceOption) (*AuthMethodLdap, error)
public AuthMethodLdap(string name, AuthMethodLdapArgs? args = null, CustomResourceOptions? opts = null)
public AuthMethodLdap(String name, AuthMethodLdapArgs args)
public AuthMethodLdap(String name, AuthMethodLdapArgs args, CustomResourceOptions options)
type: akeyless:AuthMethodLdap
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AuthMethodLdapArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AuthMethodLdapArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AuthMethodLdapArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AuthMethodLdapArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AuthMethodLdapArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var authMethodLdapResource = new Akeyless.AuthMethodLdap("authMethodLdapResource", new()
{
AccessExpires = 0,
AuditLogsClaims = new[]
{
"string",
},
AuthMethodLdapId = "string",
BoundIps = new[]
{
"string",
},
DeleteProtection = "string",
Description = "string",
ExpirationEventIns = new[]
{
"string",
},
ForceSubClaims = false,
GenKey = "string",
GwBoundIps = new[]
{
"string",
},
JwtTtl = 0,
Name = "string",
ProductTypes = new[]
{
"string",
},
PublicKeyData = "string",
UniqueIdentifier = "string",
});
example, err := akeyless.NewAuthMethodLdap(ctx, "authMethodLdapResource", &akeyless.AuthMethodLdapArgs{
AccessExpires: pulumi.Float64(0),
AuditLogsClaims: pulumi.StringArray{
pulumi.String("string"),
},
AuthMethodLdapId: pulumi.String("string"),
BoundIps: pulumi.StringArray{
pulumi.String("string"),
},
DeleteProtection: pulumi.String("string"),
Description: pulumi.String("string"),
ExpirationEventIns: pulumi.StringArray{
pulumi.String("string"),
},
ForceSubClaims: pulumi.Bool(false),
GenKey: pulumi.String("string"),
GwBoundIps: pulumi.StringArray{
pulumi.String("string"),
},
JwtTtl: pulumi.Float64(0),
Name: pulumi.String("string"),
ProductTypes: pulumi.StringArray{
pulumi.String("string"),
},
PublicKeyData: pulumi.String("string"),
UniqueIdentifier: pulumi.String("string"),
})
var authMethodLdapResource = new AuthMethodLdap("authMethodLdapResource", AuthMethodLdapArgs.builder()
.accessExpires(0.0)
.auditLogsClaims("string")
.authMethodLdapId("string")
.boundIps("string")
.deleteProtection("string")
.description("string")
.expirationEventIns("string")
.forceSubClaims(false)
.genKey("string")
.gwBoundIps("string")
.jwtTtl(0.0)
.name("string")
.productTypes("string")
.publicKeyData("string")
.uniqueIdentifier("string")
.build());
auth_method_ldap_resource = akeyless.AuthMethodLdap("authMethodLdapResource",
access_expires=0,
audit_logs_claims=["string"],
auth_method_ldap_id="string",
bound_ips=["string"],
delete_protection="string",
description="string",
expiration_event_ins=["string"],
force_sub_claims=False,
gen_key="string",
gw_bound_ips=["string"],
jwt_ttl=0,
name="string",
product_types=["string"],
public_key_data="string",
unique_identifier="string")
const authMethodLdapResource = new akeyless.AuthMethodLdap("authMethodLdapResource", {
accessExpires: 0,
auditLogsClaims: ["string"],
authMethodLdapId: "string",
boundIps: ["string"],
deleteProtection: "string",
description: "string",
expirationEventIns: ["string"],
forceSubClaims: false,
genKey: "string",
gwBoundIps: ["string"],
jwtTtl: 0,
name: "string",
productTypes: ["string"],
publicKeyData: "string",
uniqueIdentifier: "string",
});
type: akeyless:AuthMethodLdap
properties:
accessExpires: 0
auditLogsClaims:
- string
authMethodLdapId: string
boundIps:
- string
deleteProtection: string
description: string
expirationEventIns:
- string
forceSubClaims: false
genKey: string
gwBoundIps:
- string
jwtTtl: 0
name: string
productTypes:
- string
publicKeyData: string
uniqueIdentifier: string
AuthMethodLdap Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AuthMethodLdap resource accepts the following input properties:
- Access
Expires double - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- Audit
Logs List<string>Claims - Subclaims to include in audit logs
- Auth
Method stringLdap Id - The ID of this resource.
- Bound
Ips List<string> - A comma-separated CIDR block list to allow client access
- Delete
Protection string - Protection from accidental deletion of this object, [true/false]
- Description string
- Auth Method description
- Expiration
Event List<string>Ins - How many days before the expiration of the auth method would you like to be notified
- Force
Sub boolClaims - enforce role-association must include sub claims
- Gen
Key string - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- Gw
Bound List<string>Ips - A comma-separated CIDR block list as a trusted Gateway entity
- Jwt
Ttl double - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- Name string
- Auth Method name
- Product
Types List<string> - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- Public
Key stringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- Unique
Identifier string - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- Access
Expires float64 - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- Audit
Logs []stringClaims - Subclaims to include in audit logs
- Auth
Method stringLdap Id - The ID of this resource.
- Bound
Ips []string - A comma-separated CIDR block list to allow client access
- Delete
Protection string - Protection from accidental deletion of this object, [true/false]
- Description string
- Auth Method description
- Expiration
Event []stringIns - How many days before the expiration of the auth method would you like to be notified
- Force
Sub boolClaims - enforce role-association must include sub claims
- Gen
Key string - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- Gw
Bound []stringIps - A comma-separated CIDR block list as a trusted Gateway entity
- Jwt
Ttl float64 - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- Name string
- Auth Method name
- Product
Types []string - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- Public
Key stringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- Unique
Identifier string - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access
Expires Double - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- audit
Logs List<String>Claims - Subclaims to include in audit logs
- auth
Method StringLdap Id - The ID of this resource.
- bound
Ips List<String> - A comma-separated CIDR block list to allow client access
- delete
Protection String - Protection from accidental deletion of this object, [true/false]
- description String
- Auth Method description
- expiration
Event List<String>Ins - How many days before the expiration of the auth method would you like to be notified
- force
Sub BooleanClaims - enforce role-association must include sub claims
- gen
Key String - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw
Bound List<String>Ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt
Ttl Double - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name String
- Auth Method name
- product
Types List<String> - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public
Key StringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique
Identifier String - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access
Expires number - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- audit
Logs string[]Claims - Subclaims to include in audit logs
- auth
Method stringLdap Id - The ID of this resource.
- bound
Ips string[] - A comma-separated CIDR block list to allow client access
- delete
Protection string - Protection from accidental deletion of this object, [true/false]
- description string
- Auth Method description
- expiration
Event string[]Ins - How many days before the expiration of the auth method would you like to be notified
- force
Sub booleanClaims - enforce role-association must include sub claims
- gen
Key string - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw
Bound string[]Ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt
Ttl number - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name string
- Auth Method name
- product
Types string[] - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public
Key stringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique
Identifier string - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access_
expires float - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- audit_
logs_ Sequence[str]claims - Subclaims to include in audit logs
- auth_
method_ strldap_ id - The ID of this resource.
- bound_
ips Sequence[str] - A comma-separated CIDR block list to allow client access
- delete_
protection str - Protection from accidental deletion of this object, [true/false]
- description str
- Auth Method description
- expiration_
event_ Sequence[str]ins - How many days before the expiration of the auth method would you like to be notified
- force_
sub_ boolclaims - enforce role-association must include sub claims
- gen_
key str - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw_
bound_ Sequence[str]ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt_
ttl float - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name str
- Auth Method name
- product_
types Sequence[str] - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public_
key_ strdata - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique_
identifier str - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access
Expires Number - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- audit
Logs List<String>Claims - Subclaims to include in audit logs
- auth
Method StringLdap Id - The ID of this resource.
- bound
Ips List<String> - A comma-separated CIDR block list to allow client access
- delete
Protection String - Protection from accidental deletion of this object, [true/false]
- description String
- Auth Method description
- expiration
Event List<String>Ins - How many days before the expiration of the auth method would you like to be notified
- force
Sub BooleanClaims - enforce role-association must include sub claims
- gen
Key String - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw
Bound List<String>Ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt
Ttl Number - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name String
- Auth Method name
- product
Types List<String> - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public
Key StringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique
Identifier String - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
Outputs
All input properties are implicitly available as output properties. Additionally, the AuthMethodLdap resource produces the following output properties:
- Access
Id string - Auth Method access ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Private
Key stringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- Access
Id string - Auth Method access ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Private
Key stringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- access
Id String - Auth Method access ID
- id String
- The provider-assigned unique ID for this managed resource.
- private
Key StringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- access
Id string - Auth Method access ID
- id string
- The provider-assigned unique ID for this managed resource.
- private
Key stringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- access_
id str - Auth Method access ID
- id str
- The provider-assigned unique ID for this managed resource.
- private_
key_ strdata - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- access
Id String - Auth Method access ID
- id String
- The provider-assigned unique ID for this managed resource.
- private
Key StringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
Look up Existing AuthMethodLdap Resource
Get an existing AuthMethodLdap resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AuthMethodLdapState, opts?: CustomResourceOptions): AuthMethodLdap
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_expires: Optional[float] = None,
access_id: Optional[str] = None,
audit_logs_claims: Optional[Sequence[str]] = None,
auth_method_ldap_id: Optional[str] = None,
bound_ips: Optional[Sequence[str]] = None,
delete_protection: Optional[str] = None,
description: Optional[str] = None,
expiration_event_ins: Optional[Sequence[str]] = None,
force_sub_claims: Optional[bool] = None,
gen_key: Optional[str] = None,
gw_bound_ips: Optional[Sequence[str]] = None,
jwt_ttl: Optional[float] = None,
name: Optional[str] = None,
private_key_data: Optional[str] = None,
product_types: Optional[Sequence[str]] = None,
public_key_data: Optional[str] = None,
unique_identifier: Optional[str] = None) -> AuthMethodLdap
func GetAuthMethodLdap(ctx *Context, name string, id IDInput, state *AuthMethodLdapState, opts ...ResourceOption) (*AuthMethodLdap, error)
public static AuthMethodLdap Get(string name, Input<string> id, AuthMethodLdapState? state, CustomResourceOptions? opts = null)
public static AuthMethodLdap get(String name, Output<String> id, AuthMethodLdapState state, CustomResourceOptions options)
resources: _: type: akeyless:AuthMethodLdap get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Expires double - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- Access
Id string - Auth Method access ID
- Audit
Logs List<string>Claims - Subclaims to include in audit logs
- Auth
Method stringLdap Id - The ID of this resource.
- Bound
Ips List<string> - A comma-separated CIDR block list to allow client access
- Delete
Protection string - Protection from accidental deletion of this object, [true/false]
- Description string
- Auth Method description
- Expiration
Event List<string>Ins - How many days before the expiration of the auth method would you like to be notified
- Force
Sub boolClaims - enforce role-association must include sub claims
- Gen
Key string - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- Gw
Bound List<string>Ips - A comma-separated CIDR block list as a trusted Gateway entity
- Jwt
Ttl double - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- Name string
- Auth Method name
- Private
Key stringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- Product
Types List<string> - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- Public
Key stringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- Unique
Identifier string - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- Access
Expires float64 - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- Access
Id string - Auth Method access ID
- Audit
Logs []stringClaims - Subclaims to include in audit logs
- Auth
Method stringLdap Id - The ID of this resource.
- Bound
Ips []string - A comma-separated CIDR block list to allow client access
- Delete
Protection string - Protection from accidental deletion of this object, [true/false]
- Description string
- Auth Method description
- Expiration
Event []stringIns - How many days before the expiration of the auth method would you like to be notified
- Force
Sub boolClaims - enforce role-association must include sub claims
- Gen
Key string - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- Gw
Bound []stringIps - A comma-separated CIDR block list as a trusted Gateway entity
- Jwt
Ttl float64 - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- Name string
- Auth Method name
- Private
Key stringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- Product
Types []string - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- Public
Key stringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- Unique
Identifier string - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access
Expires Double - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- access
Id String - Auth Method access ID
- audit
Logs List<String>Claims - Subclaims to include in audit logs
- auth
Method StringLdap Id - The ID of this resource.
- bound
Ips List<String> - A comma-separated CIDR block list to allow client access
- delete
Protection String - Protection from accidental deletion of this object, [true/false]
- description String
- Auth Method description
- expiration
Event List<String>Ins - How many days before the expiration of the auth method would you like to be notified
- force
Sub BooleanClaims - enforce role-association must include sub claims
- gen
Key String - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw
Bound List<String>Ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt
Ttl Double - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name String
- Auth Method name
- private
Key StringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- product
Types List<String> - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public
Key StringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique
Identifier String - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access
Expires number - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- access
Id string - Auth Method access ID
- audit
Logs string[]Claims - Subclaims to include in audit logs
- auth
Method stringLdap Id - The ID of this resource.
- bound
Ips string[] - A comma-separated CIDR block list to allow client access
- delete
Protection string - Protection from accidental deletion of this object, [true/false]
- description string
- Auth Method description
- expiration
Event string[]Ins - How many days before the expiration of the auth method would you like to be notified
- force
Sub booleanClaims - enforce role-association must include sub claims
- gen
Key string - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw
Bound string[]Ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt
Ttl number - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name string
- Auth Method name
- private
Key stringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- product
Types string[] - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public
Key stringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique
Identifier string - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access_
expires float - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- access_
id str - Auth Method access ID
- audit_
logs_ Sequence[str]claims - Subclaims to include in audit logs
- auth_
method_ strldap_ id - The ID of this resource.
- bound_
ips Sequence[str] - A comma-separated CIDR block list to allow client access
- delete_
protection str - Protection from accidental deletion of this object, [true/false]
- description str
- Auth Method description
- expiration_
event_ Sequence[str]ins - How many days before the expiration of the auth method would you like to be notified
- force_
sub_ boolclaims - enforce role-association must include sub claims
- gen_
key str - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw_
bound_ Sequence[str]ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt_
ttl float - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name str
- Auth Method name
- private_
key_ strdata - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- product_
types Sequence[str] - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public_
key_ strdata - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique_
identifier str - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
- access
Expires Number - Access expiration date in Unix timestamp (select 0 for access without expiry date)
- access
Id String - Auth Method access ID
- audit
Logs List<String>Claims - Subclaims to include in audit logs
- auth
Method StringLdap Id - The ID of this resource.
- bound
Ips List<String> - A comma-separated CIDR block list to allow client access
- delete
Protection String - Protection from accidental deletion of this object, [true/false]
- description String
- Auth Method description
- expiration
Event List<String>Ins - How many days before the expiration of the auth method would you like to be notified
- force
Sub BooleanClaims - enforce role-association must include sub claims
- gen
Key String - Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided
- gw
Bound List<String>Ips - A comma-separated CIDR block list as a trusted Gateway entity
- jwt
Ttl Number - creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)
- name String
- Auth Method name
- private
Key StringData - Private key data in Base64 format. This is only returned if the gen_key parameter is set to true.
- product
Types List<String> - Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]
- public
Key StringData - A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format
- unique
Identifier String - A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.
Package Details
- Repository
- akeyless akeyless-community/terraform-provider-akeyless
- License
- Notes
- This Pulumi package is based on the
akeyless
Terraform Provider.