checkpoint.ManagementDomainPermissionsProfile
Explore with Pulumi AI
This resource allows you to execute Check Point Domain Permissions Profile.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as checkpoint from "@pulumi/checkpoint";
const example = new checkpoint.ManagementDomainPermissionsProfile("example", {});
import pulumi
import pulumi_checkpoint as checkpoint
example = checkpoint.ManagementDomainPermissionsProfile("example")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, "example", nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Checkpoint = Pulumi.Checkpoint;
return await Deployment.RunAsync(() =>
{
var example = new Checkpoint.ManagementDomainPermissionsProfile("example");
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.checkpoint.ManagementDomainPermissionsProfile;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new ManagementDomainPermissionsProfile("example");
}
}
resources:
example:
type: checkpoint:ManagementDomainPermissionsProfile
Create ManagementDomainPermissionsProfile Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ManagementDomainPermissionsProfile(name: string, args?: ManagementDomainPermissionsProfileArgs, opts?: CustomResourceOptions);
@overload
def ManagementDomainPermissionsProfile(resource_name: str,
args: Optional[ManagementDomainPermissionsProfileArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def ManagementDomainPermissionsProfile(resource_name: str,
opts: Optional[ResourceOptions] = None,
access_control: Optional[ManagementDomainPermissionsProfileAccessControlArgs] = None,
color: Optional[str] = None,
comments: Optional[str] = None,
edit_common_objects: Optional[bool] = None,
endpoint: Optional[Mapping[str, str]] = None,
events_and_reports: Optional[Mapping[str, str]] = None,
gateways: Optional[Mapping[str, str]] = None,
ignore_errors: Optional[bool] = None,
ignore_warnings: Optional[bool] = None,
management: Optional[Mapping[str, str]] = None,
management_domain_permissions_profile_id: Optional[str] = None,
monitoring_and_logging: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
others: Optional[Mapping[str, str]] = None,
permission_type: Optional[str] = None,
tags: Optional[Sequence[str]] = None,
threat_prevention: Optional[Mapping[str, str]] = None)
func NewManagementDomainPermissionsProfile(ctx *Context, name string, args *ManagementDomainPermissionsProfileArgs, opts ...ResourceOption) (*ManagementDomainPermissionsProfile, error)
public ManagementDomainPermissionsProfile(string name, ManagementDomainPermissionsProfileArgs? args = null, CustomResourceOptions? opts = null)
public ManagementDomainPermissionsProfile(String name, ManagementDomainPermissionsProfileArgs args)
public ManagementDomainPermissionsProfile(String name, ManagementDomainPermissionsProfileArgs args, CustomResourceOptions options)
type: checkpoint:ManagementDomainPermissionsProfile
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ManagementDomainPermissionsProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ManagementDomainPermissionsProfileArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ManagementDomainPermissionsProfileArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ManagementDomainPermissionsProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ManagementDomainPermissionsProfileArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var managementDomainPermissionsProfileResource = new Checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", new()
{
AccessControl = new Checkpoint.Inputs.ManagementDomainPermissionsProfileAccessControlArgs
{
AccessControlObjectsAndSettings = "string",
AppControlAndUrlFilteringUpdate = false,
DlpPolicy = "string",
GeoControlPolicy = "string",
InstallPolicy = false,
NatPolicy = "string",
PolicyLayers = new Checkpoint.Inputs.ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs
{
AppControlAndUrlFiltering = false,
ContentAwareness = false,
EditLayers = "string",
Firewall = false,
MobileAccess = false,
},
QosPolicy = "string",
ShowPolicy = false,
},
Color = "string",
Comments = "string",
EditCommonObjects = false,
Endpoint =
{
{ "string", "string" },
},
EventsAndReports =
{
{ "string", "string" },
},
Gateways =
{
{ "string", "string" },
},
IgnoreErrors = false,
IgnoreWarnings = false,
Management =
{
{ "string", "string" },
},
ManagementDomainPermissionsProfileId = "string",
MonitoringAndLogging =
{
{ "string", "string" },
},
Name = "string",
Others =
{
{ "string", "string" },
},
PermissionType = "string",
Tags = new[]
{
"string",
},
ThreatPrevention =
{
{ "string", "string" },
},
});
example, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, "managementDomainPermissionsProfileResource", &checkpoint.ManagementDomainPermissionsProfileArgs{
AccessControl: &checkpoint.ManagementDomainPermissionsProfileAccessControlArgs{
AccessControlObjectsAndSettings: pulumi.String("string"),
AppControlAndUrlFilteringUpdate: pulumi.Bool(false),
DlpPolicy: pulumi.String("string"),
GeoControlPolicy: pulumi.String("string"),
InstallPolicy: pulumi.Bool(false),
NatPolicy: pulumi.String("string"),
PolicyLayers: &checkpoint.ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs{
AppControlAndUrlFiltering: pulumi.Bool(false),
ContentAwareness: pulumi.Bool(false),
EditLayers: pulumi.String("string"),
Firewall: pulumi.Bool(false),
MobileAccess: pulumi.Bool(false),
},
QosPolicy: pulumi.String("string"),
ShowPolicy: pulumi.Bool(false),
},
Color: pulumi.String("string"),
Comments: pulumi.String("string"),
EditCommonObjects: pulumi.Bool(false),
Endpoint: pulumi.StringMap{
"string": pulumi.String("string"),
},
EventsAndReports: pulumi.StringMap{
"string": pulumi.String("string"),
},
Gateways: pulumi.StringMap{
"string": pulumi.String("string"),
},
IgnoreErrors: pulumi.Bool(false),
IgnoreWarnings: pulumi.Bool(false),
Management: pulumi.StringMap{
"string": pulumi.String("string"),
},
ManagementDomainPermissionsProfileId: pulumi.String("string"),
MonitoringAndLogging: pulumi.StringMap{
"string": pulumi.String("string"),
},
Name: pulumi.String("string"),
Others: pulumi.StringMap{
"string": pulumi.String("string"),
},
PermissionType: pulumi.String("string"),
Tags: pulumi.StringArray{
pulumi.String("string"),
},
ThreatPrevention: pulumi.StringMap{
"string": pulumi.String("string"),
},
})
var managementDomainPermissionsProfileResource = new ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", ManagementDomainPermissionsProfileArgs.builder()
.accessControl(ManagementDomainPermissionsProfileAccessControlArgs.builder()
.accessControlObjectsAndSettings("string")
.appControlAndUrlFilteringUpdate(false)
.dlpPolicy("string")
.geoControlPolicy("string")
.installPolicy(false)
.natPolicy("string")
.policyLayers(ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs.builder()
.appControlAndUrlFiltering(false)
.contentAwareness(false)
.editLayers("string")
.firewall(false)
.mobileAccess(false)
.build())
.qosPolicy("string")
.showPolicy(false)
.build())
.color("string")
.comments("string")
.editCommonObjects(false)
.endpoint(Map.of("string", "string"))
.eventsAndReports(Map.of("string", "string"))
.gateways(Map.of("string", "string"))
.ignoreErrors(false)
.ignoreWarnings(false)
.management(Map.of("string", "string"))
.managementDomainPermissionsProfileId("string")
.monitoringAndLogging(Map.of("string", "string"))
.name("string")
.others(Map.of("string", "string"))
.permissionType("string")
.tags("string")
.threatPrevention(Map.of("string", "string"))
.build());
management_domain_permissions_profile_resource = checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource",
access_control={
"access_control_objects_and_settings": "string",
"app_control_and_url_filtering_update": False,
"dlp_policy": "string",
"geo_control_policy": "string",
"install_policy": False,
"nat_policy": "string",
"policy_layers": {
"app_control_and_url_filtering": False,
"content_awareness": False,
"edit_layers": "string",
"firewall": False,
"mobile_access": False,
},
"qos_policy": "string",
"show_policy": False,
},
color="string",
comments="string",
edit_common_objects=False,
endpoint={
"string": "string",
},
events_and_reports={
"string": "string",
},
gateways={
"string": "string",
},
ignore_errors=False,
ignore_warnings=False,
management={
"string": "string",
},
management_domain_permissions_profile_id="string",
monitoring_and_logging={
"string": "string",
},
name="string",
others={
"string": "string",
},
permission_type="string",
tags=["string"],
threat_prevention={
"string": "string",
})
const managementDomainPermissionsProfileResource = new checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", {
accessControl: {
accessControlObjectsAndSettings: "string",
appControlAndUrlFilteringUpdate: false,
dlpPolicy: "string",
geoControlPolicy: "string",
installPolicy: false,
natPolicy: "string",
policyLayers: {
appControlAndUrlFiltering: false,
contentAwareness: false,
editLayers: "string",
firewall: false,
mobileAccess: false,
},
qosPolicy: "string",
showPolicy: false,
},
color: "string",
comments: "string",
editCommonObjects: false,
endpoint: {
string: "string",
},
eventsAndReports: {
string: "string",
},
gateways: {
string: "string",
},
ignoreErrors: false,
ignoreWarnings: false,
management: {
string: "string",
},
managementDomainPermissionsProfileId: "string",
monitoringAndLogging: {
string: "string",
},
name: "string",
others: {
string: "string",
},
permissionType: "string",
tags: ["string"],
threatPrevention: {
string: "string",
},
});
type: checkpoint:ManagementDomainPermissionsProfile
properties:
accessControl:
accessControlObjectsAndSettings: string
appControlAndUrlFilteringUpdate: false
dlpPolicy: string
geoControlPolicy: string
installPolicy: false
natPolicy: string
policyLayers:
appControlAndUrlFiltering: false
contentAwareness: false
editLayers: string
firewall: false
mobileAccess: false
qosPolicy: string
showPolicy: false
color: string
comments: string
editCommonObjects: false
endpoint:
string: string
eventsAndReports:
string: string
gateways:
string: string
ignoreErrors: false
ignoreWarnings: false
management:
string: string
managementDomainPermissionsProfileId: string
monitoringAndLogging:
string: string
name: string
others:
string: string
permissionType: string
tags:
- string
threatPrevention:
string: string
ManagementDomainPermissionsProfile Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ManagementDomainPermissionsProfile resource accepts the following input properties:
- Access
Control ManagementDomain Permissions Profile Access Control - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Edit
Common boolObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- Endpoint Dictionary<string, string>
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- Events
And Dictionary<string, string>Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- Gateways Dictionary<string, string>
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Management Dictionary<string, string>
- Management permissions.management blocks are documented below.
- Management
Domain stringPermissions Profile Id - Monitoring
And Dictionary<string, string>Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- Name string
- Object name.
- Others Dictionary<string, string>
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- Permission
Type string - The type of the Permissions Profile.
- List<string>
- Collection of tag identifiers.tags blocks are documented below.
- Threat
Prevention Dictionary<string, string> - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- Access
Control ManagementDomain Permissions Profile Access Control Args - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Edit
Common boolObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- Endpoint map[string]string
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- Events
And map[string]stringReports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- Gateways map[string]string
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Management map[string]string
- Management permissions.management blocks are documented below.
- Management
Domain stringPermissions Profile Id - Monitoring
And map[string]stringLogging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- Name string
- Object name.
- Others map[string]string
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- Permission
Type string - The type of the Permissions Profile.
- []string
- Collection of tag identifiers.tags blocks are documented below.
- Threat
Prevention map[string]string - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access
Control ManagementDomain Permissions Profile Access Control - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- edit
Common BooleanObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint Map<String,String>
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events
And Map<String,String>Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways Map<String,String>
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- management Map<String,String>
- Management permissions.management blocks are documented below.
- management
Domain StringPermissions Profile Id - monitoring
And Map<String,String>Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name String
- Object name.
- others Map<String,String>
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission
Type String - The type of the Permissions Profile.
- List<String>
- Collection of tag identifiers.tags blocks are documented below.
- threat
Prevention Map<String,String> - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access
Control ManagementDomain Permissions Profile Access Control - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color string
- Color of the object. Should be one of existing colors.
- comments string
- Comments string.
- edit
Common booleanObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint {[key: string]: string}
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events
And {[key: string]: string}Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways {[key: string]: string}
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore
Errors boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings boolean - Apply changes ignoring warnings.
- management {[key: string]: string}
- Management permissions.management blocks are documented below.
- management
Domain stringPermissions Profile Id - monitoring
And {[key: string]: string}Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name string
- Object name.
- others {[key: string]: string}
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission
Type string - The type of the Permissions Profile.
- string[]
- Collection of tag identifiers.tags blocks are documented below.
- threat
Prevention {[key: string]: string} - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access_
control ManagementDomain Permissions Profile Access Control Args - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color str
- Color of the object. Should be one of existing colors.
- comments str
- Comments string.
- edit_
common_ boolobjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint Mapping[str, str]
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events_
and_ Mapping[str, str]reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways Mapping[str, str]
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore_
errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_
warnings bool - Apply changes ignoring warnings.
- management Mapping[str, str]
- Management permissions.management blocks are documented below.
- management_
domain_ strpermissions_ profile_ id - monitoring_
and_ Mapping[str, str]logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name str
- Object name.
- others Mapping[str, str]
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission_
type str - The type of the Permissions Profile.
- Sequence[str]
- Collection of tag identifiers.tags blocks are documented below.
- threat_
prevention Mapping[str, str] - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access
Control Property Map - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- edit
Common BooleanObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint Map<String>
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events
And Map<String>Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways Map<String>
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- management Map<String>
- Management permissions.management blocks are documented below.
- management
Domain StringPermissions Profile Id - monitoring
And Map<String>Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name String
- Object name.
- others Map<String>
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission
Type String - The type of the Permissions Profile.
- List<String>
- Collection of tag identifiers.tags blocks are documented below.
- threat
Prevention Map<String> - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
Outputs
All input properties are implicitly available as output properties. Additionally, the ManagementDomainPermissionsProfile resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ManagementDomainPermissionsProfile Resource
Get an existing ManagementDomainPermissionsProfile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ManagementDomainPermissionsProfileState, opts?: CustomResourceOptions): ManagementDomainPermissionsProfile
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_control: Optional[ManagementDomainPermissionsProfileAccessControlArgs] = None,
color: Optional[str] = None,
comments: Optional[str] = None,
edit_common_objects: Optional[bool] = None,
endpoint: Optional[Mapping[str, str]] = None,
events_and_reports: Optional[Mapping[str, str]] = None,
gateways: Optional[Mapping[str, str]] = None,
ignore_errors: Optional[bool] = None,
ignore_warnings: Optional[bool] = None,
management: Optional[Mapping[str, str]] = None,
management_domain_permissions_profile_id: Optional[str] = None,
monitoring_and_logging: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
others: Optional[Mapping[str, str]] = None,
permission_type: Optional[str] = None,
tags: Optional[Sequence[str]] = None,
threat_prevention: Optional[Mapping[str, str]] = None) -> ManagementDomainPermissionsProfile
func GetManagementDomainPermissionsProfile(ctx *Context, name string, id IDInput, state *ManagementDomainPermissionsProfileState, opts ...ResourceOption) (*ManagementDomainPermissionsProfile, error)
public static ManagementDomainPermissionsProfile Get(string name, Input<string> id, ManagementDomainPermissionsProfileState? state, CustomResourceOptions? opts = null)
public static ManagementDomainPermissionsProfile get(String name, Output<String> id, ManagementDomainPermissionsProfileState state, CustomResourceOptions options)
resources: _: type: checkpoint:ManagementDomainPermissionsProfile get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Control ManagementDomain Permissions Profile Access Control - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Edit
Common boolObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- Endpoint Dictionary<string, string>
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- Events
And Dictionary<string, string>Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- Gateways Dictionary<string, string>
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Management Dictionary<string, string>
- Management permissions.management blocks are documented below.
- Management
Domain stringPermissions Profile Id - Monitoring
And Dictionary<string, string>Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- Name string
- Object name.
- Others Dictionary<string, string>
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- Permission
Type string - The type of the Permissions Profile.
- List<string>
- Collection of tag identifiers.tags blocks are documented below.
- Threat
Prevention Dictionary<string, string> - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- Access
Control ManagementDomain Permissions Profile Access Control Args - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Edit
Common boolObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- Endpoint map[string]string
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- Events
And map[string]stringReports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- Gateways map[string]string
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Management map[string]string
- Management permissions.management blocks are documented below.
- Management
Domain stringPermissions Profile Id - Monitoring
And map[string]stringLogging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- Name string
- Object name.
- Others map[string]string
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- Permission
Type string - The type of the Permissions Profile.
- []string
- Collection of tag identifiers.tags blocks are documented below.
- Threat
Prevention map[string]string - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access
Control ManagementDomain Permissions Profile Access Control - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- edit
Common BooleanObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint Map<String,String>
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events
And Map<String,String>Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways Map<String,String>
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- management Map<String,String>
- Management permissions.management blocks are documented below.
- management
Domain StringPermissions Profile Id - monitoring
And Map<String,String>Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name String
- Object name.
- others Map<String,String>
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission
Type String - The type of the Permissions Profile.
- List<String>
- Collection of tag identifiers.tags blocks are documented below.
- threat
Prevention Map<String,String> - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access
Control ManagementDomain Permissions Profile Access Control - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color string
- Color of the object. Should be one of existing colors.
- comments string
- Comments string.
- edit
Common booleanObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint {[key: string]: string}
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events
And {[key: string]: string}Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways {[key: string]: string}
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore
Errors boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings boolean - Apply changes ignoring warnings.
- management {[key: string]: string}
- Management permissions.management blocks are documented below.
- management
Domain stringPermissions Profile Id - monitoring
And {[key: string]: string}Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name string
- Object name.
- others {[key: string]: string}
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission
Type string - The type of the Permissions Profile.
- string[]
- Collection of tag identifiers.tags blocks are documented below.
- threat
Prevention {[key: string]: string} - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access_
control ManagementDomain Permissions Profile Access Control Args - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color str
- Color of the object. Should be one of existing colors.
- comments str
- Comments string.
- edit_
common_ boolobjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint Mapping[str, str]
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events_
and_ Mapping[str, str]reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways Mapping[str, str]
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore_
errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_
warnings bool - Apply changes ignoring warnings.
- management Mapping[str, str]
- Management permissions.management blocks are documented below.
- management_
domain_ strpermissions_ profile_ id - monitoring_
and_ Mapping[str, str]logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name str
- Object name.
- others Mapping[str, str]
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission_
type str - The type of the Permissions Profile.
- Sequence[str]
- Collection of tag identifiers.tags blocks are documented below.
- threat_
prevention Mapping[str, str] - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
- access
Control Property Map - Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- edit
Common BooleanObjects - Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
- endpoint Map<String>
- Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
- events
And Map<String>Reports - Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
- gateways Map<String>
- Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- management Map<String>
- Management permissions.management blocks are documented below.
- management
Domain StringPermissions Profile Id - monitoring
And Map<String>Logging - Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
- name String
- Object name.
- others Map<String>
- Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
- permission
Type String - The type of the Permissions Profile.
- List<String>
- Collection of tag identifiers.tags blocks are documented below.
- threat
Prevention Map<String> - Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
Supporting Types
ManagementDomainPermissionsProfileAccessControl, ManagementDomainPermissionsProfileAccessControlArgs
- Access
Control stringObjects And Settings - Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
- App
Control boolAnd Url Filtering Update - Install Application and URL Filtering updates.
- Dlp
Policy string - Configure DLP rules and Policies.
- Geo
Control stringPolicy - Work with Access Control rules that control traffic to and from specified countries.
- Install
Policy bool - Install Access Control Policies.
- Nat
Policy string - Work with NAT in Access Control rules.
- Policy
Layers ManagementDomain Permissions Profile Access Control Policy Layers - Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
- Qos
Policy string - Work with QoS Policies and rules.
- Show
Policy bool - Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
- Access
Control stringObjects And Settings - Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
- App
Control boolAnd Url Filtering Update - Install Application and URL Filtering updates.
- Dlp
Policy string - Configure DLP rules and Policies.
- Geo
Control stringPolicy - Work with Access Control rules that control traffic to and from specified countries.
- Install
Policy bool - Install Access Control Policies.
- Nat
Policy string - Work with NAT in Access Control rules.
- Policy
Layers ManagementDomain Permissions Profile Access Control Policy Layers - Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
- Qos
Policy string - Work with QoS Policies and rules.
- Show
Policy bool - Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
- access
Control StringObjects And Settings - Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
- app
Control BooleanAnd Url Filtering Update - Install Application and URL Filtering updates.
- dlp
Policy String - Configure DLP rules and Policies.
- geo
Control StringPolicy - Work with Access Control rules that control traffic to and from specified countries.
- install
Policy Boolean - Install Access Control Policies.
- nat
Policy String - Work with NAT in Access Control rules.
- policy
Layers ManagementDomain Permissions Profile Access Control Policy Layers - Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
- qos
Policy String - Work with QoS Policies and rules.
- show
Policy Boolean - Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
- access
Control stringObjects And Settings - Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
- app
Control booleanAnd Url Filtering Update - Install Application and URL Filtering updates.
- dlp
Policy string - Configure DLP rules and Policies.
- geo
Control stringPolicy - Work with Access Control rules that control traffic to and from specified countries.
- install
Policy boolean - Install Access Control Policies.
- nat
Policy string - Work with NAT in Access Control rules.
- policy
Layers ManagementDomain Permissions Profile Access Control Policy Layers - Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
- qos
Policy string - Work with QoS Policies and rules.
- show
Policy boolean - Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
- access_
control_ strobjects_ and_ settings - Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
- app_
control_ booland_ url_ filtering_ update - Install Application and URL Filtering updates.
- dlp_
policy str - Configure DLP rules and Policies.
- geo_
control_ strpolicy - Work with Access Control rules that control traffic to and from specified countries.
- install_
policy bool - Install Access Control Policies.
- nat_
policy str - Work with NAT in Access Control rules.
- policy_
layers ManagementDomain Permissions Profile Access Control Policy Layers - Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
- qos_
policy str - Work with QoS Policies and rules.
- show_
policy bool - Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
- access
Control StringObjects And Settings - Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
- app
Control BooleanAnd Url Filtering Update - Install Application and URL Filtering updates.
- dlp
Policy String - Configure DLP rules and Policies.
- geo
Control StringPolicy - Work with Access Control rules that control traffic to and from specified countries.
- install
Policy Boolean - Install Access Control Policies.
- nat
Policy String - Work with NAT in Access Control rules.
- policy
Layers Property Map - Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
- qos
Policy String - Work with QoS Policies and rules.
- show
Policy Boolean - Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
ManagementDomainPermissionsProfileAccessControlPolicyLayers, ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs
- App
Control boolAnd Url Filtering - Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- Content
Awareness bool - Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- Edit
Layers string - "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
- Firewall bool
- Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
- Mobile
Access bool - Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
- App
Control boolAnd Url Filtering - Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- Content
Awareness bool - Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- Edit
Layers string - "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
- Firewall bool
- Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
- Mobile
Access bool - Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
- app
Control BooleanAnd Url Filtering - Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- content
Awareness Boolean - Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- edit
Layers String - "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
- firewall Boolean
- Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
- mobile
Access Boolean - Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
- app
Control booleanAnd Url Filtering - Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- content
Awareness boolean - Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- edit
Layers string - "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
- firewall boolean
- Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
- mobile
Access boolean - Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
- app_
control_ booland_ url_ filtering - Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- content_
awareness bool - Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- edit_
layers str - "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
- firewall bool
- Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
- mobile_
access bool - Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
- app
Control BooleanAnd Url Filtering - Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- content
Awareness Boolean - Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
- edit
Layers String - "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
- firewall Boolean
- Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
- mobile
Access Boolean - Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
Package Details
- Repository
- checkpoint checkpointsw/terraform-provider-checkpoint
- License
- Notes
- This Pulumi package is based on the
checkpoint
Terraform Provider.