1. Packages
  2. Checkpoint Provider
  3. API Docs
  4. ManagementDomainPermissionsProfile
checkpoint 2.9.0 published on Monday, Apr 14, 2025 by checkpointsw

checkpoint.ManagementDomainPermissionsProfile

Explore with Pulumi AI

checkpoint logo
checkpoint 2.9.0 published on Monday, Apr 14, 2025 by checkpointsw

    This resource allows you to execute Check Point Domain Permissions Profile.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as checkpoint from "@pulumi/checkpoint";
    
    const example = new checkpoint.ManagementDomainPermissionsProfile("example", {});
    
    import pulumi
    import pulumi_checkpoint as checkpoint
    
    example = checkpoint.ManagementDomainPermissionsProfile("example")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, "example", nil)
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Checkpoint = Pulumi.Checkpoint;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Checkpoint.ManagementDomainPermissionsProfile("example");
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.checkpoint.ManagementDomainPermissionsProfile;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new ManagementDomainPermissionsProfile("example");
    
        }
    }
    
    resources:
      example:
        type: checkpoint:ManagementDomainPermissionsProfile
    

    Create ManagementDomainPermissionsProfile Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ManagementDomainPermissionsProfile(name: string, args?: ManagementDomainPermissionsProfileArgs, opts?: CustomResourceOptions);
    @overload
    def ManagementDomainPermissionsProfile(resource_name: str,
                                           args: Optional[ManagementDomainPermissionsProfileArgs] = None,
                                           opts: Optional[ResourceOptions] = None)
    
    @overload
    def ManagementDomainPermissionsProfile(resource_name: str,
                                           opts: Optional[ResourceOptions] = None,
                                           access_control: Optional[ManagementDomainPermissionsProfileAccessControlArgs] = None,
                                           color: Optional[str] = None,
                                           comments: Optional[str] = None,
                                           edit_common_objects: Optional[bool] = None,
                                           endpoint: Optional[Mapping[str, str]] = None,
                                           events_and_reports: Optional[Mapping[str, str]] = None,
                                           gateways: Optional[Mapping[str, str]] = None,
                                           ignore_errors: Optional[bool] = None,
                                           ignore_warnings: Optional[bool] = None,
                                           management: Optional[Mapping[str, str]] = None,
                                           management_domain_permissions_profile_id: Optional[str] = None,
                                           monitoring_and_logging: Optional[Mapping[str, str]] = None,
                                           name: Optional[str] = None,
                                           others: Optional[Mapping[str, str]] = None,
                                           permission_type: Optional[str] = None,
                                           tags: Optional[Sequence[str]] = None,
                                           threat_prevention: Optional[Mapping[str, str]] = None)
    func NewManagementDomainPermissionsProfile(ctx *Context, name string, args *ManagementDomainPermissionsProfileArgs, opts ...ResourceOption) (*ManagementDomainPermissionsProfile, error)
    public ManagementDomainPermissionsProfile(string name, ManagementDomainPermissionsProfileArgs? args = null, CustomResourceOptions? opts = null)
    public ManagementDomainPermissionsProfile(String name, ManagementDomainPermissionsProfileArgs args)
    public ManagementDomainPermissionsProfile(String name, ManagementDomainPermissionsProfileArgs args, CustomResourceOptions options)
    
    type: checkpoint:ManagementDomainPermissionsProfile
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var managementDomainPermissionsProfileResource = new Checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", new()
    {
        AccessControl = new Checkpoint.Inputs.ManagementDomainPermissionsProfileAccessControlArgs
        {
            AccessControlObjectsAndSettings = "string",
            AppControlAndUrlFilteringUpdate = false,
            DlpPolicy = "string",
            GeoControlPolicy = "string",
            InstallPolicy = false,
            NatPolicy = "string",
            PolicyLayers = new Checkpoint.Inputs.ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs
            {
                AppControlAndUrlFiltering = false,
                ContentAwareness = false,
                EditLayers = "string",
                Firewall = false,
                MobileAccess = false,
            },
            QosPolicy = "string",
            ShowPolicy = false,
        },
        Color = "string",
        Comments = "string",
        EditCommonObjects = false,
        Endpoint = 
        {
            { "string", "string" },
        },
        EventsAndReports = 
        {
            { "string", "string" },
        },
        Gateways = 
        {
            { "string", "string" },
        },
        IgnoreErrors = false,
        IgnoreWarnings = false,
        Management = 
        {
            { "string", "string" },
        },
        ManagementDomainPermissionsProfileId = "string",
        MonitoringAndLogging = 
        {
            { "string", "string" },
        },
        Name = "string",
        Others = 
        {
            { "string", "string" },
        },
        PermissionType = "string",
        Tags = new[]
        {
            "string",
        },
        ThreatPrevention = 
        {
            { "string", "string" },
        },
    });
    
    example, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, "managementDomainPermissionsProfileResource", &checkpoint.ManagementDomainPermissionsProfileArgs{
    	AccessControl: &checkpoint.ManagementDomainPermissionsProfileAccessControlArgs{
    		AccessControlObjectsAndSettings: pulumi.String("string"),
    		AppControlAndUrlFilteringUpdate: pulumi.Bool(false),
    		DlpPolicy:                       pulumi.String("string"),
    		GeoControlPolicy:                pulumi.String("string"),
    		InstallPolicy:                   pulumi.Bool(false),
    		NatPolicy:                       pulumi.String("string"),
    		PolicyLayers: &checkpoint.ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs{
    			AppControlAndUrlFiltering: pulumi.Bool(false),
    			ContentAwareness:          pulumi.Bool(false),
    			EditLayers:                pulumi.String("string"),
    			Firewall:                  pulumi.Bool(false),
    			MobileAccess:              pulumi.Bool(false),
    		},
    		QosPolicy:  pulumi.String("string"),
    		ShowPolicy: pulumi.Bool(false),
    	},
    	Color:             pulumi.String("string"),
    	Comments:          pulumi.String("string"),
    	EditCommonObjects: pulumi.Bool(false),
    	Endpoint: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	EventsAndReports: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Gateways: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	IgnoreErrors:   pulumi.Bool(false),
    	IgnoreWarnings: pulumi.Bool(false),
    	Management: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	ManagementDomainPermissionsProfileId: pulumi.String("string"),
    	MonitoringAndLogging: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Name: pulumi.String("string"),
    	Others: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	PermissionType: pulumi.String("string"),
    	Tags: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	ThreatPrevention: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    })
    
    var managementDomainPermissionsProfileResource = new ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", ManagementDomainPermissionsProfileArgs.builder()
        .accessControl(ManagementDomainPermissionsProfileAccessControlArgs.builder()
            .accessControlObjectsAndSettings("string")
            .appControlAndUrlFilteringUpdate(false)
            .dlpPolicy("string")
            .geoControlPolicy("string")
            .installPolicy(false)
            .natPolicy("string")
            .policyLayers(ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs.builder()
                .appControlAndUrlFiltering(false)
                .contentAwareness(false)
                .editLayers("string")
                .firewall(false)
                .mobileAccess(false)
                .build())
            .qosPolicy("string")
            .showPolicy(false)
            .build())
        .color("string")
        .comments("string")
        .editCommonObjects(false)
        .endpoint(Map.of("string", "string"))
        .eventsAndReports(Map.of("string", "string"))
        .gateways(Map.of("string", "string"))
        .ignoreErrors(false)
        .ignoreWarnings(false)
        .management(Map.of("string", "string"))
        .managementDomainPermissionsProfileId("string")
        .monitoringAndLogging(Map.of("string", "string"))
        .name("string")
        .others(Map.of("string", "string"))
        .permissionType("string")
        .tags("string")
        .threatPrevention(Map.of("string", "string"))
        .build());
    
    management_domain_permissions_profile_resource = checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource",
        access_control={
            "access_control_objects_and_settings": "string",
            "app_control_and_url_filtering_update": False,
            "dlp_policy": "string",
            "geo_control_policy": "string",
            "install_policy": False,
            "nat_policy": "string",
            "policy_layers": {
                "app_control_and_url_filtering": False,
                "content_awareness": False,
                "edit_layers": "string",
                "firewall": False,
                "mobile_access": False,
            },
            "qos_policy": "string",
            "show_policy": False,
        },
        color="string",
        comments="string",
        edit_common_objects=False,
        endpoint={
            "string": "string",
        },
        events_and_reports={
            "string": "string",
        },
        gateways={
            "string": "string",
        },
        ignore_errors=False,
        ignore_warnings=False,
        management={
            "string": "string",
        },
        management_domain_permissions_profile_id="string",
        monitoring_and_logging={
            "string": "string",
        },
        name="string",
        others={
            "string": "string",
        },
        permission_type="string",
        tags=["string"],
        threat_prevention={
            "string": "string",
        })
    
    const managementDomainPermissionsProfileResource = new checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", {
        accessControl: {
            accessControlObjectsAndSettings: "string",
            appControlAndUrlFilteringUpdate: false,
            dlpPolicy: "string",
            geoControlPolicy: "string",
            installPolicy: false,
            natPolicy: "string",
            policyLayers: {
                appControlAndUrlFiltering: false,
                contentAwareness: false,
                editLayers: "string",
                firewall: false,
                mobileAccess: false,
            },
            qosPolicy: "string",
            showPolicy: false,
        },
        color: "string",
        comments: "string",
        editCommonObjects: false,
        endpoint: {
            string: "string",
        },
        eventsAndReports: {
            string: "string",
        },
        gateways: {
            string: "string",
        },
        ignoreErrors: false,
        ignoreWarnings: false,
        management: {
            string: "string",
        },
        managementDomainPermissionsProfileId: "string",
        monitoringAndLogging: {
            string: "string",
        },
        name: "string",
        others: {
            string: "string",
        },
        permissionType: "string",
        tags: ["string"],
        threatPrevention: {
            string: "string",
        },
    });
    
    type: checkpoint:ManagementDomainPermissionsProfile
    properties:
        accessControl:
            accessControlObjectsAndSettings: string
            appControlAndUrlFilteringUpdate: false
            dlpPolicy: string
            geoControlPolicy: string
            installPolicy: false
            natPolicy: string
            policyLayers:
                appControlAndUrlFiltering: false
                contentAwareness: false
                editLayers: string
                firewall: false
                mobileAccess: false
            qosPolicy: string
            showPolicy: false
        color: string
        comments: string
        editCommonObjects: false
        endpoint:
            string: string
        eventsAndReports:
            string: string
        gateways:
            string: string
        ignoreErrors: false
        ignoreWarnings: false
        management:
            string: string
        managementDomainPermissionsProfileId: string
        monitoringAndLogging:
            string: string
        name: string
        others:
            string: string
        permissionType: string
        tags:
            - string
        threatPrevention:
            string: string
    

    ManagementDomainPermissionsProfile Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ManagementDomainPermissionsProfile resource accepts the following input properties:

    AccessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint Dictionary<string, string>
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports Dictionary<string, string>
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways Dictionary<string, string>
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management Dictionary<string, string>
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging Dictionary<string, string>
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others Dictionary<string, string>
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags List<string>
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention Dictionary<string, string>
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    AccessControl ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint map[string]string
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports map[string]string
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways map[string]string
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management map[string]string
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging map[string]string
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others map[string]string
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags []string
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention map[string]string
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Map<String,String>
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports Map<String,String>
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Map<String,String>
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management Map<String,String>
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging Map<String,String>
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others Map<String,String>
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention Map<String,String>
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color string
    Color of the object. Should be one of existing colors.
    comments string
    Comments string.
    editCommonObjects boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint {[key: string]: string}
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports {[key: string]: string}
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways {[key: string]: string}
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings boolean
    Apply changes ignoring warnings.
    management {[key: string]: string}
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId string
    monitoringAndLogging {[key: string]: string}
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name string
    Object name.
    others {[key: string]: string}
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType string
    The type of the Permissions Profile.
    tags string[]
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention {[key: string]: string}
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    access_control ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color str
    Color of the object. Should be one of existing colors.
    comments str
    Comments string.
    edit_common_objects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Mapping[str, str]
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    events_and_reports Mapping[str, str]
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Mapping[str, str]
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignore_errors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignore_warnings bool
    Apply changes ignoring warnings.
    management Mapping[str, str]
    Management permissions.management blocks are documented below.
    management_domain_permissions_profile_id str
    monitoring_and_logging Mapping[str, str]
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name str
    Object name.
    others Mapping[str, str]
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permission_type str
    The type of the Permissions Profile.
    tags Sequence[str]
    Collection of tag identifiers.tags blocks are documented below.
    threat_prevention Mapping[str, str]
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl Property Map
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Map<String>
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports Map<String>
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Map<String>
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management Map<String>
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging Map<String>
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others Map<String>
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention Map<String>
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ManagementDomainPermissionsProfile resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ManagementDomainPermissionsProfile Resource

    Get an existing ManagementDomainPermissionsProfile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ManagementDomainPermissionsProfileState, opts?: CustomResourceOptions): ManagementDomainPermissionsProfile
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            access_control: Optional[ManagementDomainPermissionsProfileAccessControlArgs] = None,
            color: Optional[str] = None,
            comments: Optional[str] = None,
            edit_common_objects: Optional[bool] = None,
            endpoint: Optional[Mapping[str, str]] = None,
            events_and_reports: Optional[Mapping[str, str]] = None,
            gateways: Optional[Mapping[str, str]] = None,
            ignore_errors: Optional[bool] = None,
            ignore_warnings: Optional[bool] = None,
            management: Optional[Mapping[str, str]] = None,
            management_domain_permissions_profile_id: Optional[str] = None,
            monitoring_and_logging: Optional[Mapping[str, str]] = None,
            name: Optional[str] = None,
            others: Optional[Mapping[str, str]] = None,
            permission_type: Optional[str] = None,
            tags: Optional[Sequence[str]] = None,
            threat_prevention: Optional[Mapping[str, str]] = None) -> ManagementDomainPermissionsProfile
    func GetManagementDomainPermissionsProfile(ctx *Context, name string, id IDInput, state *ManagementDomainPermissionsProfileState, opts ...ResourceOption) (*ManagementDomainPermissionsProfile, error)
    public static ManagementDomainPermissionsProfile Get(string name, Input<string> id, ManagementDomainPermissionsProfileState? state, CustomResourceOptions? opts = null)
    public static ManagementDomainPermissionsProfile get(String name, Output<String> id, ManagementDomainPermissionsProfileState state, CustomResourceOptions options)
    resources:  _:    type: checkpoint:ManagementDomainPermissionsProfile    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint Dictionary<string, string>
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports Dictionary<string, string>
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways Dictionary<string, string>
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management Dictionary<string, string>
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging Dictionary<string, string>
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others Dictionary<string, string>
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags List<string>
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention Dictionary<string, string>
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    AccessControl ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint map[string]string
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports map[string]string
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways map[string]string
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management map[string]string
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging map[string]string
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others map[string]string
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags []string
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention map[string]string
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Map<String,String>
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports Map<String,String>
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Map<String,String>
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management Map<String,String>
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging Map<String,String>
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others Map<String,String>
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention Map<String,String>
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color string
    Color of the object. Should be one of existing colors.
    comments string
    Comments string.
    editCommonObjects boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint {[key: string]: string}
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports {[key: string]: string}
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways {[key: string]: string}
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings boolean
    Apply changes ignoring warnings.
    management {[key: string]: string}
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId string
    monitoringAndLogging {[key: string]: string}
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name string
    Object name.
    others {[key: string]: string}
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType string
    The type of the Permissions Profile.
    tags string[]
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention {[key: string]: string}
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    access_control ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color str
    Color of the object. Should be one of existing colors.
    comments str
    Comments string.
    edit_common_objects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Mapping[str, str]
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    events_and_reports Mapping[str, str]
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Mapping[str, str]
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignore_errors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignore_warnings bool
    Apply changes ignoring warnings.
    management Mapping[str, str]
    Management permissions.management blocks are documented below.
    management_domain_permissions_profile_id str
    monitoring_and_logging Mapping[str, str]
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name str
    Object name.
    others Mapping[str, str]
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permission_type str
    The type of the Permissions Profile.
    tags Sequence[str]
    Collection of tag identifiers.tags blocks are documented below.
    threat_prevention Mapping[str, str]
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl Property Map
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Map<String>
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports Map<String>
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Map<String>
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management Map<String>
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging Map<String>
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others Map<String>
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention Map<String>
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.

    Supporting Types

    ManagementDomainPermissionsProfileAccessControl, ManagementDomainPermissionsProfileAccessControlArgs

    AccessControlObjectsAndSettings string
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    AppControlAndUrlFilteringUpdate bool
    Install Application and URL Filtering updates.
    DlpPolicy string
    Configure DLP rules and Policies.
    GeoControlPolicy string
    Work with Access Control rules that control traffic to and from specified countries.
    InstallPolicy bool
    Install Access Control Policies.
    NatPolicy string
    Work with NAT in Access Control rules.
    PolicyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    QosPolicy string
    Work with QoS Policies and rules.
    ShowPolicy bool
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    AccessControlObjectsAndSettings string
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    AppControlAndUrlFilteringUpdate bool
    Install Application and URL Filtering updates.
    DlpPolicy string
    Configure DLP rules and Policies.
    GeoControlPolicy string
    Work with Access Control rules that control traffic to and from specified countries.
    InstallPolicy bool
    Install Access Control Policies.
    NatPolicy string
    Work with NAT in Access Control rules.
    PolicyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    QosPolicy string
    Work with QoS Policies and rules.
    ShowPolicy bool
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    accessControlObjectsAndSettings String
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    appControlAndUrlFilteringUpdate Boolean
    Install Application and URL Filtering updates.
    dlpPolicy String
    Configure DLP rules and Policies.
    geoControlPolicy String
    Work with Access Control rules that control traffic to and from specified countries.
    installPolicy Boolean
    Install Access Control Policies.
    natPolicy String
    Work with NAT in Access Control rules.
    policyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qosPolicy String
    Work with QoS Policies and rules.
    showPolicy Boolean
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    accessControlObjectsAndSettings string
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    appControlAndUrlFilteringUpdate boolean
    Install Application and URL Filtering updates.
    dlpPolicy string
    Configure DLP rules and Policies.
    geoControlPolicy string
    Work with Access Control rules that control traffic to and from specified countries.
    installPolicy boolean
    Install Access Control Policies.
    natPolicy string
    Work with NAT in Access Control rules.
    policyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qosPolicy string
    Work with QoS Policies and rules.
    showPolicy boolean
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    access_control_objects_and_settings str
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    app_control_and_url_filtering_update bool
    Install Application and URL Filtering updates.
    dlp_policy str
    Configure DLP rules and Policies.
    geo_control_policy str
    Work with Access Control rules that control traffic to and from specified countries.
    install_policy bool
    Install Access Control Policies.
    nat_policy str
    Work with NAT in Access Control rules.
    policy_layers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qos_policy str
    Work with QoS Policies and rules.
    show_policy bool
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    accessControlObjectsAndSettings String
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    appControlAndUrlFilteringUpdate Boolean
    Install Application and URL Filtering updates.
    dlpPolicy String
    Configure DLP rules and Policies.
    geoControlPolicy String
    Work with Access Control rules that control traffic to and from specified countries.
    installPolicy Boolean
    Install Access Control Policies.
    natPolicy String
    Work with NAT in Access Control rules.
    policyLayers Property Map
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qosPolicy String
    Work with QoS Policies and rules.
    showPolicy Boolean
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.

    ManagementDomainPermissionsProfileAccessControlPolicyLayers, ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs

    AppControlAndUrlFiltering bool
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    ContentAwareness bool
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    EditLayers string
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    Firewall bool
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    MobileAccess bool
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    AppControlAndUrlFiltering bool
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    ContentAwareness bool
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    EditLayers string
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    Firewall bool
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    MobileAccess bool
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    appControlAndUrlFiltering Boolean
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    contentAwareness Boolean
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    editLayers String
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall Boolean
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobileAccess Boolean
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    appControlAndUrlFiltering boolean
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    contentAwareness boolean
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    editLayers string
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall boolean
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobileAccess boolean
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    app_control_and_url_filtering bool
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    content_awareness bool
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    edit_layers str
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall bool
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobile_access bool
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    appControlAndUrlFiltering Boolean
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    contentAwareness Boolean
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    editLayers String
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall Boolean
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobileAccess Boolean
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".

    Package Details

    Repository
    checkpoint checkpointsw/terraform-provider-checkpoint
    License
    Notes
    This Pulumi package is based on the checkpoint Terraform Provider.
    checkpoint logo
    checkpoint 2.9.0 published on Monday, Apr 14, 2025 by checkpointsw