ibm.AppidTokenConfig
Explore with Pulumi AI
Create, update, or delete an IBM Cloud AppID Management Services token configuration resource. This resource is associated with an IBM Cloud AppID Management Services instance. For more information, about AppID token configuration, see Customizing AppID tokens.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as ibm from "@pulumi/ibm";
const tc = new ibm.AppidTokenConfig("tc", {
tenantId: _var.tenant_id,
accessTokenExpiresIn: 7200,
anonymousAccessEnabled: true,
anonymousTokenExpiresIn: 3200,
refreshTokenEnabled: false,
accessTokenClaims: [
{
source: "roles",
destinationClaim: "groupIds",
},
{
source: "appid_custom",
sourceClaim: "employeeId",
destinationClaim: "employeeId",
},
{
source: "saml",
sourceClaim: "attributes.uid",
destinationClaim: "employeeId",
},
],
});
import pulumi
import pulumi_ibm as ibm
tc = ibm.AppidTokenConfig("tc",
tenant_id=var["tenant_id"],
access_token_expires_in=7200,
anonymous_access_enabled=True,
anonymous_token_expires_in=3200,
refresh_token_enabled=False,
access_token_claims=[
{
"source": "roles",
"destination_claim": "groupIds",
},
{
"source": "appid_custom",
"source_claim": "employeeId",
"destination_claim": "employeeId",
},
{
"source": "saml",
"source_claim": "attributes.uid",
"destination_claim": "employeeId",
},
])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := ibm.NewAppidTokenConfig(ctx, "tc", &ibm.AppidTokenConfigArgs{
TenantId: pulumi.Any(_var.Tenant_id),
AccessTokenExpiresIn: pulumi.Float64(7200),
AnonymousAccessEnabled: pulumi.Bool(true),
AnonymousTokenExpiresIn: pulumi.Float64(3200),
RefreshTokenEnabled: pulumi.Bool(false),
AccessTokenClaims: ibm.AppidTokenConfigAccessTokenClaimArray{
&ibm.AppidTokenConfigAccessTokenClaimArgs{
Source: pulumi.String("roles"),
DestinationClaim: pulumi.String("groupIds"),
},
&ibm.AppidTokenConfigAccessTokenClaimArgs{
Source: pulumi.String("appid_custom"),
SourceClaim: pulumi.String("employeeId"),
DestinationClaim: pulumi.String("employeeId"),
},
&ibm.AppidTokenConfigAccessTokenClaimArgs{
Source: pulumi.String("saml"),
SourceClaim: pulumi.String("attributes.uid"),
DestinationClaim: pulumi.String("employeeId"),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ibm = Pulumi.Ibm;
return await Deployment.RunAsync(() =>
{
var tc = new Ibm.AppidTokenConfig("tc", new()
{
TenantId = @var.Tenant_id,
AccessTokenExpiresIn = 7200,
AnonymousAccessEnabled = true,
AnonymousTokenExpiresIn = 3200,
RefreshTokenEnabled = false,
AccessTokenClaims = new[]
{
new Ibm.Inputs.AppidTokenConfigAccessTokenClaimArgs
{
Source = "roles",
DestinationClaim = "groupIds",
},
new Ibm.Inputs.AppidTokenConfigAccessTokenClaimArgs
{
Source = "appid_custom",
SourceClaim = "employeeId",
DestinationClaim = "employeeId",
},
new Ibm.Inputs.AppidTokenConfigAccessTokenClaimArgs
{
Source = "saml",
SourceClaim = "attributes.uid",
DestinationClaim = "employeeId",
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ibm.AppidTokenConfig;
import com.pulumi.ibm.AppidTokenConfigArgs;
import com.pulumi.ibm.inputs.AppidTokenConfigAccessTokenClaimArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var tc = new AppidTokenConfig("tc", AppidTokenConfigArgs.builder()
.tenantId(var_.tenant_id())
.accessTokenExpiresIn(7200)
.anonymousAccessEnabled(true)
.anonymousTokenExpiresIn(3200)
.refreshTokenEnabled(false)
.accessTokenClaims(
AppidTokenConfigAccessTokenClaimArgs.builder()
.source("roles")
.destinationClaim("groupIds")
.build(),
AppidTokenConfigAccessTokenClaimArgs.builder()
.source("appid_custom")
.sourceClaim("employeeId")
.destinationClaim("employeeId")
.build(),
AppidTokenConfigAccessTokenClaimArgs.builder()
.source("saml")
.sourceClaim("attributes.uid")
.destinationClaim("employeeId")
.build())
.build());
}
}
resources:
tc:
type: ibm:AppidTokenConfig
properties:
tenantId: ${var.tenant_id}
accessTokenExpiresIn: 7200
anonymousAccessEnabled: true
anonymousTokenExpiresIn: 3200
refreshTokenEnabled: false
accessTokenClaims:
- source: roles
destinationClaim: groupIds
- source: appid_custom
sourceClaim: employeeId
destinationClaim: employeeId
- source: saml
sourceClaim: attributes.uid
destinationClaim: employeeId
Create AppidTokenConfig Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AppidTokenConfig(name: string, args: AppidTokenConfigArgs, opts?: CustomResourceOptions);
@overload
def AppidTokenConfig(resource_name: str,
args: AppidTokenConfigArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AppidTokenConfig(resource_name: str,
opts: Optional[ResourceOptions] = None,
tenant_id: Optional[str] = None,
access_token_claims: Optional[Sequence[AppidTokenConfigAccessTokenClaimArgs]] = None,
access_token_expires_in: Optional[float] = None,
anonymous_access_enabled: Optional[bool] = None,
anonymous_token_expires_in: Optional[float] = None,
appid_token_config_id: Optional[str] = None,
id_token_claims: Optional[Sequence[AppidTokenConfigIdTokenClaimArgs]] = None,
refresh_token_enabled: Optional[bool] = None,
refresh_token_expires_in: Optional[float] = None)
func NewAppidTokenConfig(ctx *Context, name string, args AppidTokenConfigArgs, opts ...ResourceOption) (*AppidTokenConfig, error)
public AppidTokenConfig(string name, AppidTokenConfigArgs args, CustomResourceOptions? opts = null)
public AppidTokenConfig(String name, AppidTokenConfigArgs args)
public AppidTokenConfig(String name, AppidTokenConfigArgs args, CustomResourceOptions options)
type: ibm:AppidTokenConfig
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AppidTokenConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AppidTokenConfigArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AppidTokenConfigArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AppidTokenConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AppidTokenConfigArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var appidTokenConfigResource = new Ibm.AppidTokenConfig("appidTokenConfigResource", new()
{
TenantId = "string",
AccessTokenClaims = new[]
{
new Ibm.Inputs.AppidTokenConfigAccessTokenClaimArgs
{
Source = "string",
DestinationClaim = "string",
SourceClaim = "string",
},
},
AccessTokenExpiresIn = 0,
AnonymousAccessEnabled = false,
AnonymousTokenExpiresIn = 0,
AppidTokenConfigId = "string",
IdTokenClaims = new[]
{
new Ibm.Inputs.AppidTokenConfigIdTokenClaimArgs
{
Source = "string",
DestinationClaim = "string",
SourceClaim = "string",
},
},
RefreshTokenEnabled = false,
RefreshTokenExpiresIn = 0,
});
example, err := ibm.NewAppidTokenConfig(ctx, "appidTokenConfigResource", &ibm.AppidTokenConfigArgs{
TenantId: pulumi.String("string"),
AccessTokenClaims: ibm.AppidTokenConfigAccessTokenClaimArray{
&ibm.AppidTokenConfigAccessTokenClaimArgs{
Source: pulumi.String("string"),
DestinationClaim: pulumi.String("string"),
SourceClaim: pulumi.String("string"),
},
},
AccessTokenExpiresIn: pulumi.Float64(0),
AnonymousAccessEnabled: pulumi.Bool(false),
AnonymousTokenExpiresIn: pulumi.Float64(0),
AppidTokenConfigId: pulumi.String("string"),
IdTokenClaims: ibm.AppidTokenConfigIdTokenClaimArray{
&ibm.AppidTokenConfigIdTokenClaimArgs{
Source: pulumi.String("string"),
DestinationClaim: pulumi.String("string"),
SourceClaim: pulumi.String("string"),
},
},
RefreshTokenEnabled: pulumi.Bool(false),
RefreshTokenExpiresIn: pulumi.Float64(0),
})
var appidTokenConfigResource = new AppidTokenConfig("appidTokenConfigResource", AppidTokenConfigArgs.builder()
.tenantId("string")
.accessTokenClaims(AppidTokenConfigAccessTokenClaimArgs.builder()
.source("string")
.destinationClaim("string")
.sourceClaim("string")
.build())
.accessTokenExpiresIn(0)
.anonymousAccessEnabled(false)
.anonymousTokenExpiresIn(0)
.appidTokenConfigId("string")
.idTokenClaims(AppidTokenConfigIdTokenClaimArgs.builder()
.source("string")
.destinationClaim("string")
.sourceClaim("string")
.build())
.refreshTokenEnabled(false)
.refreshTokenExpiresIn(0)
.build());
appid_token_config_resource = ibm.AppidTokenConfig("appidTokenConfigResource",
tenant_id="string",
access_token_claims=[{
"source": "string",
"destination_claim": "string",
"source_claim": "string",
}],
access_token_expires_in=0,
anonymous_access_enabled=False,
anonymous_token_expires_in=0,
appid_token_config_id="string",
id_token_claims=[{
"source": "string",
"destination_claim": "string",
"source_claim": "string",
}],
refresh_token_enabled=False,
refresh_token_expires_in=0)
const appidTokenConfigResource = new ibm.AppidTokenConfig("appidTokenConfigResource", {
tenantId: "string",
accessTokenClaims: [{
source: "string",
destinationClaim: "string",
sourceClaim: "string",
}],
accessTokenExpiresIn: 0,
anonymousAccessEnabled: false,
anonymousTokenExpiresIn: 0,
appidTokenConfigId: "string",
idTokenClaims: [{
source: "string",
destinationClaim: "string",
sourceClaim: "string",
}],
refreshTokenEnabled: false,
refreshTokenExpiresIn: 0,
});
type: ibm:AppidTokenConfig
properties:
accessTokenClaims:
- destinationClaim: string
source: string
sourceClaim: string
accessTokenExpiresIn: 0
anonymousAccessEnabled: false
anonymousTokenExpiresIn: 0
appidTokenConfigId: string
idTokenClaims:
- destinationClaim: string
source: string
sourceClaim: string
refreshTokenEnabled: false
refreshTokenExpiresIn: 0
tenantId: string
AppidTokenConfig Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AppidTokenConfig resource accepts the following input properties:
- Tenant
Id string - The AppID instance GUID
- Access
Token List<AppidClaims Token Config Access Token Claim> A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- Access
Token doubleExpires In - The length of time for which access tokens are valid in seconds
- Anonymous
Access boolEnabled - Enable anonymous access
- Anonymous
Token doubleExpires In - The length of time for which an anonymous token is valid in seconds
- Appid
Token stringConfig Id - Id
Token List<AppidClaims Token Config Id Token Claim> A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- Refresh
Token boolEnabled - Enable refresh token
- Refresh
Token doubleExpires In - The length of time for which refresh tokens are valid in seconds
- Tenant
Id string - The AppID instance GUID
- Access
Token []AppidClaims Token Config Access Token Claim Args A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- Access
Token float64Expires In - The length of time for which access tokens are valid in seconds
- Anonymous
Access boolEnabled - Enable anonymous access
- Anonymous
Token float64Expires In - The length of time for which an anonymous token is valid in seconds
- Appid
Token stringConfig Id - Id
Token []AppidClaims Token Config Id Token Claim Args A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- Refresh
Token boolEnabled - Enable refresh token
- Refresh
Token float64Expires In - The length of time for which refresh tokens are valid in seconds
- tenant
Id String - The AppID instance GUID
- access
Token List<AppidClaims Token Config Access Token Claim> A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access
Token DoubleExpires In - The length of time for which access tokens are valid in seconds
- anonymous
Access BooleanEnabled - Enable anonymous access
- anonymous
Token DoubleExpires In - The length of time for which an anonymous token is valid in seconds
- appid
Token StringConfig Id - id
Token List<AppidClaims Token Config Id Token Claim> A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh
Token BooleanEnabled - Enable refresh token
- refresh
Token DoubleExpires In - The length of time for which refresh tokens are valid in seconds
- tenant
Id string - The AppID instance GUID
- access
Token AppidClaims Token Config Access Token Claim[] A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access
Token numberExpires In - The length of time for which access tokens are valid in seconds
- anonymous
Access booleanEnabled - Enable anonymous access
- anonymous
Token numberExpires In - The length of time for which an anonymous token is valid in seconds
- appid
Token stringConfig Id - id
Token AppidClaims Token Config Id Token Claim[] A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh
Token booleanEnabled - Enable refresh token
- refresh
Token numberExpires In - The length of time for which refresh tokens are valid in seconds
- tenant_
id str - The AppID instance GUID
- access_
token_ Sequence[Appidclaims Token Config Access Token Claim Args] A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access_
token_ floatexpires_ in - The length of time for which access tokens are valid in seconds
- anonymous_
access_ boolenabled - Enable anonymous access
- anonymous_
token_ floatexpires_ in - The length of time for which an anonymous token is valid in seconds
- appid_
token_ strconfig_ id - id_
token_ Sequence[Appidclaims Token Config Id Token Claim Args] A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh_
token_ boolenabled - Enable refresh token
- refresh_
token_ floatexpires_ in - The length of time for which refresh tokens are valid in seconds
- tenant
Id String - The AppID instance GUID
- access
Token List<Property Map>Claims A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access
Token NumberExpires In - The length of time for which access tokens are valid in seconds
- anonymous
Access BooleanEnabled - Enable anonymous access
- anonymous
Token NumberExpires In - The length of time for which an anonymous token is valid in seconds
- appid
Token StringConfig Id - id
Token List<Property Map>Claims A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh
Token BooleanEnabled - Enable refresh token
- refresh
Token NumberExpires In - The length of time for which refresh tokens are valid in seconds
Outputs
All input properties are implicitly available as output properties. Additionally, the AppidTokenConfig resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing AppidTokenConfig Resource
Get an existing AppidTokenConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AppidTokenConfigState, opts?: CustomResourceOptions): AppidTokenConfig
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_token_claims: Optional[Sequence[AppidTokenConfigAccessTokenClaimArgs]] = None,
access_token_expires_in: Optional[float] = None,
anonymous_access_enabled: Optional[bool] = None,
anonymous_token_expires_in: Optional[float] = None,
appid_token_config_id: Optional[str] = None,
id_token_claims: Optional[Sequence[AppidTokenConfigIdTokenClaimArgs]] = None,
refresh_token_enabled: Optional[bool] = None,
refresh_token_expires_in: Optional[float] = None,
tenant_id: Optional[str] = None) -> AppidTokenConfig
func GetAppidTokenConfig(ctx *Context, name string, id IDInput, state *AppidTokenConfigState, opts ...ResourceOption) (*AppidTokenConfig, error)
public static AppidTokenConfig Get(string name, Input<string> id, AppidTokenConfigState? state, CustomResourceOptions? opts = null)
public static AppidTokenConfig get(String name, Output<String> id, AppidTokenConfigState state, CustomResourceOptions options)
resources: _: type: ibm:AppidTokenConfig get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Token List<AppidClaims Token Config Access Token Claim> A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- Access
Token doubleExpires In - The length of time for which access tokens are valid in seconds
- Anonymous
Access boolEnabled - Enable anonymous access
- Anonymous
Token doubleExpires In - The length of time for which an anonymous token is valid in seconds
- Appid
Token stringConfig Id - Id
Token List<AppidClaims Token Config Id Token Claim> A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- Refresh
Token boolEnabled - Enable refresh token
- Refresh
Token doubleExpires In - The length of time for which refresh tokens are valid in seconds
- Tenant
Id string - The AppID instance GUID
- Access
Token []AppidClaims Token Config Access Token Claim Args A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- Access
Token float64Expires In - The length of time for which access tokens are valid in seconds
- Anonymous
Access boolEnabled - Enable anonymous access
- Anonymous
Token float64Expires In - The length of time for which an anonymous token is valid in seconds
- Appid
Token stringConfig Id - Id
Token []AppidClaims Token Config Id Token Claim Args A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- Refresh
Token boolEnabled - Enable refresh token
- Refresh
Token float64Expires In - The length of time for which refresh tokens are valid in seconds
- Tenant
Id string - The AppID instance GUID
- access
Token List<AppidClaims Token Config Access Token Claim> A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access
Token DoubleExpires In - The length of time for which access tokens are valid in seconds
- anonymous
Access BooleanEnabled - Enable anonymous access
- anonymous
Token DoubleExpires In - The length of time for which an anonymous token is valid in seconds
- appid
Token StringConfig Id - id
Token List<AppidClaims Token Config Id Token Claim> A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh
Token BooleanEnabled - Enable refresh token
- refresh
Token DoubleExpires In - The length of time for which refresh tokens are valid in seconds
- tenant
Id String - The AppID instance GUID
- access
Token AppidClaims Token Config Access Token Claim[] A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access
Token numberExpires In - The length of time for which access tokens are valid in seconds
- anonymous
Access booleanEnabled - Enable anonymous access
- anonymous
Token numberExpires In - The length of time for which an anonymous token is valid in seconds
- appid
Token stringConfig Id - id
Token AppidClaims Token Config Id Token Claim[] A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh
Token booleanEnabled - Enable refresh token
- refresh
Token numberExpires In - The length of time for which refresh tokens are valid in seconds
- tenant
Id string - The AppID instance GUID
- access_
token_ Sequence[Appidclaims Token Config Access Token Claim Args] A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access_
token_ floatexpires_ in - The length of time for which access tokens are valid in seconds
- anonymous_
access_ boolenabled - Enable anonymous access
- anonymous_
token_ floatexpires_ in - The length of time for which an anonymous token is valid in seconds
- appid_
token_ strconfig_ id - id_
token_ Sequence[Appidclaims Token Config Id Token Claim Args] A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh_
token_ boolenabled - Enable refresh token
- refresh_
token_ floatexpires_ in - The length of time for which refresh tokens are valid in seconds
- tenant_
id str - The AppID instance GUID
- access
Token List<Property Map>Claims A set of objects that are created when claims that are related to access tokens are mapped
Nested scheme for
access_token_claim
:- access
Token NumberExpires In - The length of time for which access tokens are valid in seconds
- anonymous
Access BooleanEnabled - Enable anonymous access
- anonymous
Token NumberExpires In - The length of time for which an anonymous token is valid in seconds
- appid
Token StringConfig Id - id
Token List<Property Map>Claims A set of objects that are created when claims that are related to identity tokens are mapped
Nested scheme for
id_token_claim
:- refresh
Token BooleanEnabled - Enable refresh token
- refresh
Token NumberExpires In - The length of time for which refresh tokens are valid in seconds
- tenant
Id String - The AppID instance GUID
Supporting Types
AppidTokenConfigAccessTokenClaim, AppidTokenConfigAccessTokenClaimArgs
- Source string
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- Destination
Claim string - Defines the custom attribute that can override the current claim in token
- Source
Claim string - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- Source string
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- Destination
Claim string - Defines the custom attribute that can override the current claim in token
- Source
Claim string - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source String
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination
Claim String - Defines the custom attribute that can override the current claim in token
- source
Claim String - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source string
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination
Claim string - Defines the custom attribute that can override the current claim in token
- source
Claim string - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source str
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination_
claim str - Defines the custom attribute that can override the current claim in token
- source_
claim str - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source String
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination
Claim String - Defines the custom attribute that can override the current claim in token
- source
Claim String - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
AppidTokenConfigIdTokenClaim, AppidTokenConfigIdTokenClaimArgs
- Source string
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- Destination
Claim string - Defines the custom attribute that can override the current claim in token
- Source
Claim string - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- Source string
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- Destination
Claim string - Defines the custom attribute that can override the current claim in token
- Source
Claim string - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source String
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination
Claim String - Defines the custom attribute that can override the current claim in token
- source
Claim String - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source string
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination
Claim string - Defines the custom attribute that can override the current claim in token
- source
Claim string - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source str
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination_
claim str - Defines the custom attribute that can override the current claim in token
- source_
claim str - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
- source String
- Defines the source of the claim. Options include:
saml
,cloud_directory
,facebook
,google
,appid_custom
,ibmid
,roles
andattributes
- destination
Claim String - Defines the custom attribute that can override the current claim in token
- source
Claim String - Defines the claim as provided by the source. It can refer to the identity provider's user information or the user's App ID custom attributes
Import
The ibm_appid_token_config
resource can be imported by using the AppID tenant ID.
Syntax
bash
$ pulumi import ibm:index/appidTokenConfig:AppidTokenConfig tc <tenant_id>
Example
bash
$ pulumi import ibm:index/appidTokenConfig:AppidTokenConfig tc 5fa344a8-d361-4bc2-9051-58ca253f4b2b
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- ibm ibm-cloud/terraform-provider-ibm
- License
- Notes
- This Pulumi package is based on the
ibm
Terraform Provider.