published on Tuesday, Apr 28, 2026 by paloaltonetworks
published on Tuesday, Apr 28, 2026 by paloaltonetworks
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as panos from "@pulumi/panos";
const example = new panos.Template("example", {
location: {
panorama: {},
},
name: "mfa-template",
});
// Certificate profile for MFA server validation
const mfaCa = new panos.CertificateProfile("mfa_ca", {
location: {
template: {
name: example.name,
},
},
name: "mfa-server-ca",
});
// Okta Adaptive MFA Profile
// Okta provides adaptive MFA based on context and risk
const okta = new panos.MfaServerProfile("okta", {
location: {
template: {
name: example.name,
},
},
name: "okta-mfa-profile",
mfaCertProfile: mfaCa.name,
mfaVendorType: "okta-adaptive-v1",
mfaConfigs: [
{
name: "okta-api-host",
value: "company.okta.com",
},
{
name: "okta-baseuri",
value: "/api/v1",
},
{
name: "okta-token",
value: "00A1bCdEfGhIjKlMnOpQrStUvWxYz2345678",
},
{
name: "okta-org",
value: "company",
},
{
name: "okta-timeout",
value: "30",
},
],
});
// Duo Security MFA Profile
// Duo provides push notifications, SMS, and phone call verification
const duo = new panos.MfaServerProfile("duo", {
location: {
template: {
name: example.name,
},
},
name: "duo-mfa-profile",
mfaCertProfile: mfaCa.name,
mfaVendorType: "duo-security-v2",
mfaConfigs: [
{
name: "duo-api-host",
value: "api-a1b2c3d4.duosecurity.com",
},
{
name: "duo-integration-key",
value: "DIXXXXXXXXXXXXXXXXXX",
},
{
name: "duo-secret-key",
value: "deadbeefcafebabe0123456789abcdef01234567",
},
{
name: "duo-timeout",
value: "30",
},
{
name: "duo-baseuri",
value: "https://api-a1b2c3d4.duosecurity.com",
},
],
});
// PingIdentity MFA Profile
// PingIdentity provides enterprise-grade adaptive authentication
const ping = new panos.MfaServerProfile("ping", {
location: {
template: {
name: example.name,
},
},
name: "ping-mfa-profile",
mfaCertProfile: mfaCa.name,
mfaVendorType: "ping-identity-v1",
mfaConfigs: [
{
name: "ping-api-host",
value: "idpxnyl3m.pingidentity.com",
},
{
name: "ping-baseuri",
value: "https://tenant.pingone.com",
},
{
name: "ping-token",
value: "AbCdEfGhIjKlMnOpQrStUvWxYz0123456789",
},
{
name: "ping-org-alias",
value: "12345678-1234-1234-1234-123456789abc",
},
{
name: "ping-timeout",
value: "30",
},
],
});
// RSA SecurID Access MFA Profile
// RSA provides hardware token and software token based authentication
const rsa = new panos.MfaServerProfile("rsa", {
location: {
template: {
name: example.name,
},
},
name: "rsa-mfa-profile",
mfaCertProfile: mfaCa.name,
mfaVendorType: "rsa-securid-access-v1",
mfaConfigs: [
{
name: "rsa-api-host",
value: "cloud.securid.com",
},
{
name: "rsa-baseuri",
value: "https://tenant.rsa.com",
},
{
name: "rsa-accesskey",
value: "abcdef1234567890ABCDEF1234567890",
},
{
name: "rsa-accessid",
value: "RSAID123456",
},
{
name: "rsa-assurancepolicyid",
value: "policy-abc-123-def-456",
},
{
name: "rsa-timeout",
value: "90",
},
],
});
import pulumi
import pulumi_panos as panos
example = panos.Template("example",
location={
"panorama": {},
},
name="mfa-template")
# Certificate profile for MFA server validation
mfa_ca = panos.CertificateProfile("mfa_ca",
location={
"template": {
"name": example.name,
},
},
name="mfa-server-ca")
# Okta Adaptive MFA Profile
# Okta provides adaptive MFA based on context and risk
okta = panos.MfaServerProfile("okta",
location={
"template": {
"name": example.name,
},
},
name="okta-mfa-profile",
mfa_cert_profile=mfa_ca.name,
mfa_vendor_type="okta-adaptive-v1",
mfa_configs=[
{
"name": "okta-api-host",
"value": "company.okta.com",
},
{
"name": "okta-baseuri",
"value": "/api/v1",
},
{
"name": "okta-token",
"value": "00A1bCdEfGhIjKlMnOpQrStUvWxYz2345678",
},
{
"name": "okta-org",
"value": "company",
},
{
"name": "okta-timeout",
"value": "30",
},
])
# Duo Security MFA Profile
# Duo provides push notifications, SMS, and phone call verification
duo = panos.MfaServerProfile("duo",
location={
"template": {
"name": example.name,
},
},
name="duo-mfa-profile",
mfa_cert_profile=mfa_ca.name,
mfa_vendor_type="duo-security-v2",
mfa_configs=[
{
"name": "duo-api-host",
"value": "api-a1b2c3d4.duosecurity.com",
},
{
"name": "duo-integration-key",
"value": "DIXXXXXXXXXXXXXXXXXX",
},
{
"name": "duo-secret-key",
"value": "deadbeefcafebabe0123456789abcdef01234567",
},
{
"name": "duo-timeout",
"value": "30",
},
{
"name": "duo-baseuri",
"value": "https://api-a1b2c3d4.duosecurity.com",
},
])
# PingIdentity MFA Profile
# PingIdentity provides enterprise-grade adaptive authentication
ping = panos.MfaServerProfile("ping",
location={
"template": {
"name": example.name,
},
},
name="ping-mfa-profile",
mfa_cert_profile=mfa_ca.name,
mfa_vendor_type="ping-identity-v1",
mfa_configs=[
{
"name": "ping-api-host",
"value": "idpxnyl3m.pingidentity.com",
},
{
"name": "ping-baseuri",
"value": "https://tenant.pingone.com",
},
{
"name": "ping-token",
"value": "AbCdEfGhIjKlMnOpQrStUvWxYz0123456789",
},
{
"name": "ping-org-alias",
"value": "12345678-1234-1234-1234-123456789abc",
},
{
"name": "ping-timeout",
"value": "30",
},
])
# RSA SecurID Access MFA Profile
# RSA provides hardware token and software token based authentication
rsa = panos.MfaServerProfile("rsa",
location={
"template": {
"name": example.name,
},
},
name="rsa-mfa-profile",
mfa_cert_profile=mfa_ca.name,
mfa_vendor_type="rsa-securid-access-v1",
mfa_configs=[
{
"name": "rsa-api-host",
"value": "cloud.securid.com",
},
{
"name": "rsa-baseuri",
"value": "https://tenant.rsa.com",
},
{
"name": "rsa-accesskey",
"value": "abcdef1234567890ABCDEF1234567890",
},
{
"name": "rsa-accessid",
"value": "RSAID123456",
},
{
"name": "rsa-assurancepolicyid",
"value": "policy-abc-123-def-456",
},
{
"name": "rsa-timeout",
"value": "90",
},
])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/panos/v2/panos"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := panos.NewTemplate(ctx, "example", &panos.TemplateArgs{
Location: &panos.TemplateLocationArgs{
Panorama: &panos.TemplateLocationPanoramaArgs{},
},
Name: pulumi.String("mfa-template"),
})
if err != nil {
return err
}
// Certificate profile for MFA server validation
mfaCa, err := panos.NewCertificateProfile(ctx, "mfa_ca", &panos.CertificateProfileArgs{
Location: &panos.CertificateProfileLocationArgs{
Template: &panos.CertificateProfileLocationTemplateArgs{
Name: example.Name,
},
},
Name: pulumi.String("mfa-server-ca"),
})
if err != nil {
return err
}
// Okta Adaptive MFA Profile
// Okta provides adaptive MFA based on context and risk
_, err = panos.NewMfaServerProfile(ctx, "okta", &panos.MfaServerProfileArgs{
Location: &panos.MfaServerProfileLocationArgs{
Template: &panos.MfaServerProfileLocationTemplateArgs{
Name: example.Name,
},
},
Name: pulumi.String("okta-mfa-profile"),
MfaCertProfile: mfaCa.Name,
MfaVendorType: pulumi.String("okta-adaptive-v1"),
MfaConfigs: panos.MfaServerProfileMfaConfigArray{
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("okta-api-host"),
Value: pulumi.String("company.okta.com"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("okta-baseuri"),
Value: pulumi.String("/api/v1"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("okta-token"),
Value: pulumi.String("00A1bCdEfGhIjKlMnOpQrStUvWxYz2345678"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("okta-org"),
Value: pulumi.String("company"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("okta-timeout"),
Value: pulumi.String("30"),
},
},
})
if err != nil {
return err
}
// Duo Security MFA Profile
// Duo provides push notifications, SMS, and phone call verification
_, err = panos.NewMfaServerProfile(ctx, "duo", &panos.MfaServerProfileArgs{
Location: &panos.MfaServerProfileLocationArgs{
Template: &panos.MfaServerProfileLocationTemplateArgs{
Name: example.Name,
},
},
Name: pulumi.String("duo-mfa-profile"),
MfaCertProfile: mfaCa.Name,
MfaVendorType: pulumi.String("duo-security-v2"),
MfaConfigs: panos.MfaServerProfileMfaConfigArray{
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("duo-api-host"),
Value: pulumi.String("api-a1b2c3d4.duosecurity.com"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("duo-integration-key"),
Value: pulumi.String("DIXXXXXXXXXXXXXXXXXX"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("duo-secret-key"),
Value: pulumi.String("deadbeefcafebabe0123456789abcdef01234567"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("duo-timeout"),
Value: pulumi.String("30"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("duo-baseuri"),
Value: pulumi.String("https://api-a1b2c3d4.duosecurity.com"),
},
},
})
if err != nil {
return err
}
// PingIdentity MFA Profile
// PingIdentity provides enterprise-grade adaptive authentication
_, err = panos.NewMfaServerProfile(ctx, "ping", &panos.MfaServerProfileArgs{
Location: &panos.MfaServerProfileLocationArgs{
Template: &panos.MfaServerProfileLocationTemplateArgs{
Name: example.Name,
},
},
Name: pulumi.String("ping-mfa-profile"),
MfaCertProfile: mfaCa.Name,
MfaVendorType: pulumi.String("ping-identity-v1"),
MfaConfigs: panos.MfaServerProfileMfaConfigArray{
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("ping-api-host"),
Value: pulumi.String("idpxnyl3m.pingidentity.com"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("ping-baseuri"),
Value: pulumi.String("https://tenant.pingone.com"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("ping-token"),
Value: pulumi.String("AbCdEfGhIjKlMnOpQrStUvWxYz0123456789"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("ping-org-alias"),
Value: pulumi.String("12345678-1234-1234-1234-123456789abc"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("ping-timeout"),
Value: pulumi.String("30"),
},
},
})
if err != nil {
return err
}
// RSA SecurID Access MFA Profile
// RSA provides hardware token and software token based authentication
_, err = panos.NewMfaServerProfile(ctx, "rsa", &panos.MfaServerProfileArgs{
Location: &panos.MfaServerProfileLocationArgs{
Template: &panos.MfaServerProfileLocationTemplateArgs{
Name: example.Name,
},
},
Name: pulumi.String("rsa-mfa-profile"),
MfaCertProfile: mfaCa.Name,
MfaVendorType: pulumi.String("rsa-securid-access-v1"),
MfaConfigs: panos.MfaServerProfileMfaConfigArray{
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("rsa-api-host"),
Value: pulumi.String("cloud.securid.com"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("rsa-baseuri"),
Value: pulumi.String("https://tenant.rsa.com"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("rsa-accesskey"),
Value: pulumi.String("abcdef1234567890ABCDEF1234567890"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("rsa-accessid"),
Value: pulumi.String("RSAID123456"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("rsa-assurancepolicyid"),
Value: pulumi.String("policy-abc-123-def-456"),
},
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("rsa-timeout"),
Value: pulumi.String("90"),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Panos = Pulumi.Panos;
return await Deployment.RunAsync(() =>
{
var example = new Panos.Template("example", new()
{
Location = new Panos.Inputs.TemplateLocationArgs
{
Panorama = null,
},
Name = "mfa-template",
});
// Certificate profile for MFA server validation
var mfaCa = new Panos.CertificateProfile("mfa_ca", new()
{
Location = new Panos.Inputs.CertificateProfileLocationArgs
{
Template = new Panos.Inputs.CertificateProfileLocationTemplateArgs
{
Name = example.Name,
},
},
Name = "mfa-server-ca",
});
// Okta Adaptive MFA Profile
// Okta provides adaptive MFA based on context and risk
var okta = new Panos.MfaServerProfile("okta", new()
{
Location = new Panos.Inputs.MfaServerProfileLocationArgs
{
Template = new Panos.Inputs.MfaServerProfileLocationTemplateArgs
{
Name = example.Name,
},
},
Name = "okta-mfa-profile",
MfaCertProfile = mfaCa.Name,
MfaVendorType = "okta-adaptive-v1",
MfaConfigs = new[]
{
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "okta-api-host",
Value = "company.okta.com",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "okta-baseuri",
Value = "/api/v1",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "okta-token",
Value = "00A1bCdEfGhIjKlMnOpQrStUvWxYz2345678",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "okta-org",
Value = "company",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "okta-timeout",
Value = "30",
},
},
});
// Duo Security MFA Profile
// Duo provides push notifications, SMS, and phone call verification
var duo = new Panos.MfaServerProfile("duo", new()
{
Location = new Panos.Inputs.MfaServerProfileLocationArgs
{
Template = new Panos.Inputs.MfaServerProfileLocationTemplateArgs
{
Name = example.Name,
},
},
Name = "duo-mfa-profile",
MfaCertProfile = mfaCa.Name,
MfaVendorType = "duo-security-v2",
MfaConfigs = new[]
{
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "duo-api-host",
Value = "api-a1b2c3d4.duosecurity.com",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "duo-integration-key",
Value = "DIXXXXXXXXXXXXXXXXXX",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "duo-secret-key",
Value = "deadbeefcafebabe0123456789abcdef01234567",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "duo-timeout",
Value = "30",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "duo-baseuri",
Value = "https://api-a1b2c3d4.duosecurity.com",
},
},
});
// PingIdentity MFA Profile
// PingIdentity provides enterprise-grade adaptive authentication
var ping = new Panos.MfaServerProfile("ping", new()
{
Location = new Panos.Inputs.MfaServerProfileLocationArgs
{
Template = new Panos.Inputs.MfaServerProfileLocationTemplateArgs
{
Name = example.Name,
},
},
Name = "ping-mfa-profile",
MfaCertProfile = mfaCa.Name,
MfaVendorType = "ping-identity-v1",
MfaConfigs = new[]
{
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "ping-api-host",
Value = "idpxnyl3m.pingidentity.com",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "ping-baseuri",
Value = "https://tenant.pingone.com",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "ping-token",
Value = "AbCdEfGhIjKlMnOpQrStUvWxYz0123456789",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "ping-org-alias",
Value = "12345678-1234-1234-1234-123456789abc",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "ping-timeout",
Value = "30",
},
},
});
// RSA SecurID Access MFA Profile
// RSA provides hardware token and software token based authentication
var rsa = new Panos.MfaServerProfile("rsa", new()
{
Location = new Panos.Inputs.MfaServerProfileLocationArgs
{
Template = new Panos.Inputs.MfaServerProfileLocationTemplateArgs
{
Name = example.Name,
},
},
Name = "rsa-mfa-profile",
MfaCertProfile = mfaCa.Name,
MfaVendorType = "rsa-securid-access-v1",
MfaConfigs = new[]
{
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "rsa-api-host",
Value = "cloud.securid.com",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "rsa-baseuri",
Value = "https://tenant.rsa.com",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "rsa-accesskey",
Value = "abcdef1234567890ABCDEF1234567890",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "rsa-accessid",
Value = "RSAID123456",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "rsa-assurancepolicyid",
Value = "policy-abc-123-def-456",
},
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "rsa-timeout",
Value = "90",
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.panos.Template;
import com.pulumi.panos.TemplateArgs;
import com.pulumi.panos.inputs.TemplateLocationArgs;
import com.pulumi.panos.inputs.TemplateLocationPanoramaArgs;
import com.pulumi.panos.CertificateProfile;
import com.pulumi.panos.CertificateProfileArgs;
import com.pulumi.panos.inputs.CertificateProfileLocationArgs;
import com.pulumi.panos.inputs.CertificateProfileLocationTemplateArgs;
import com.pulumi.panos.MfaServerProfile;
import com.pulumi.panos.MfaServerProfileArgs;
import com.pulumi.panos.inputs.MfaServerProfileLocationArgs;
import com.pulumi.panos.inputs.MfaServerProfileLocationTemplateArgs;
import com.pulumi.panos.inputs.MfaServerProfileMfaConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new Template("example", TemplateArgs.builder()
.location(TemplateLocationArgs.builder()
.panorama(TemplateLocationPanoramaArgs.builder()
.build())
.build())
.name("mfa-template")
.build());
// Certificate profile for MFA server validation
var mfaCa = new CertificateProfile("mfaCa", CertificateProfileArgs.builder()
.location(CertificateProfileLocationArgs.builder()
.template(CertificateProfileLocationTemplateArgs.builder()
.name(example.name())
.build())
.build())
.name("mfa-server-ca")
.build());
// Okta Adaptive MFA Profile
// Okta provides adaptive MFA based on context and risk
var okta = new MfaServerProfile("okta", MfaServerProfileArgs.builder()
.location(MfaServerProfileLocationArgs.builder()
.template(MfaServerProfileLocationTemplateArgs.builder()
.name(example.name())
.build())
.build())
.name("okta-mfa-profile")
.mfaCertProfile(mfaCa.name())
.mfaVendorType("okta-adaptive-v1")
.mfaConfigs(
MfaServerProfileMfaConfigArgs.builder()
.name("okta-api-host")
.value("company.okta.com")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("okta-baseuri")
.value("/api/v1")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("okta-token")
.value("00A1bCdEfGhIjKlMnOpQrStUvWxYz2345678")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("okta-org")
.value("company")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("okta-timeout")
.value("30")
.build())
.build());
// Duo Security MFA Profile
// Duo provides push notifications, SMS, and phone call verification
var duo = new MfaServerProfile("duo", MfaServerProfileArgs.builder()
.location(MfaServerProfileLocationArgs.builder()
.template(MfaServerProfileLocationTemplateArgs.builder()
.name(example.name())
.build())
.build())
.name("duo-mfa-profile")
.mfaCertProfile(mfaCa.name())
.mfaVendorType("duo-security-v2")
.mfaConfigs(
MfaServerProfileMfaConfigArgs.builder()
.name("duo-api-host")
.value("api-a1b2c3d4.duosecurity.com")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("duo-integration-key")
.value("DIXXXXXXXXXXXXXXXXXX")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("duo-secret-key")
.value("deadbeefcafebabe0123456789abcdef01234567")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("duo-timeout")
.value("30")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("duo-baseuri")
.value("https://api-a1b2c3d4.duosecurity.com")
.build())
.build());
// PingIdentity MFA Profile
// PingIdentity provides enterprise-grade adaptive authentication
var ping = new MfaServerProfile("ping", MfaServerProfileArgs.builder()
.location(MfaServerProfileLocationArgs.builder()
.template(MfaServerProfileLocationTemplateArgs.builder()
.name(example.name())
.build())
.build())
.name("ping-mfa-profile")
.mfaCertProfile(mfaCa.name())
.mfaVendorType("ping-identity-v1")
.mfaConfigs(
MfaServerProfileMfaConfigArgs.builder()
.name("ping-api-host")
.value("idpxnyl3m.pingidentity.com")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("ping-baseuri")
.value("https://tenant.pingone.com")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("ping-token")
.value("AbCdEfGhIjKlMnOpQrStUvWxYz0123456789")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("ping-org-alias")
.value("12345678-1234-1234-1234-123456789abc")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("ping-timeout")
.value("30")
.build())
.build());
// RSA SecurID Access MFA Profile
// RSA provides hardware token and software token based authentication
var rsa = new MfaServerProfile("rsa", MfaServerProfileArgs.builder()
.location(MfaServerProfileLocationArgs.builder()
.template(MfaServerProfileLocationTemplateArgs.builder()
.name(example.name())
.build())
.build())
.name("rsa-mfa-profile")
.mfaCertProfile(mfaCa.name())
.mfaVendorType("rsa-securid-access-v1")
.mfaConfigs(
MfaServerProfileMfaConfigArgs.builder()
.name("rsa-api-host")
.value("cloud.securid.com")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("rsa-baseuri")
.value("https://tenant.rsa.com")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("rsa-accesskey")
.value("abcdef1234567890ABCDEF1234567890")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("rsa-accessid")
.value("RSAID123456")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("rsa-assurancepolicyid")
.value("policy-abc-123-def-456")
.build(),
MfaServerProfileMfaConfigArgs.builder()
.name("rsa-timeout")
.value("90")
.build())
.build());
}
}
resources:
example:
type: panos:Template
properties:
location:
panorama: {}
name: mfa-template
# Certificate profile for MFA server validation
mfaCa:
type: panos:CertificateProfile
name: mfa_ca
properties:
location:
template:
name: ${example.name}
name: mfa-server-ca
# Okta Adaptive MFA Profile
# Okta provides adaptive MFA based on context and risk
okta:
type: panos:MfaServerProfile
properties:
location:
template:
name: ${example.name}
name: okta-mfa-profile
mfaCertProfile: ${mfaCa.name}
mfaVendorType: okta-adaptive-v1
mfaConfigs:
- name: okta-api-host
value: company.okta.com
- name: okta-baseuri
value: /api/v1
- name: okta-token
value: 00A1bCdEfGhIjKlMnOpQrStUvWxYz2345678
- name: okta-org
value: company
- name: okta-timeout
value: '30'
# Duo Security MFA Profile
# Duo provides push notifications, SMS, and phone call verification
duo:
type: panos:MfaServerProfile
properties:
location:
template:
name: ${example.name}
name: duo-mfa-profile
mfaCertProfile: ${mfaCa.name}
mfaVendorType: duo-security-v2
mfaConfigs:
- name: duo-api-host
value: api-a1b2c3d4.duosecurity.com
- name: duo-integration-key
value: DIXXXXXXXXXXXXXXXXXX
- name: duo-secret-key
value: deadbeefcafebabe0123456789abcdef01234567
- name: duo-timeout
value: '30'
- name: duo-baseuri
value: https://api-a1b2c3d4.duosecurity.com
# PingIdentity MFA Profile
# PingIdentity provides enterprise-grade adaptive authentication
ping:
type: panos:MfaServerProfile
properties:
location:
template:
name: ${example.name}
name: ping-mfa-profile
mfaCertProfile: ${mfaCa.name}
mfaVendorType: ping-identity-v1
mfaConfigs:
- name: ping-api-host
value: idpxnyl3m.pingidentity.com
- name: ping-baseuri
value: https://tenant.pingone.com
- name: ping-token
value: AbCdEfGhIjKlMnOpQrStUvWxYz0123456789
- name: ping-org-alias
value: 12345678-1234-1234-1234-123456789abc
- name: ping-timeout
value: '30'
# RSA SecurID Access MFA Profile
# RSA provides hardware token and software token based authentication
rsa:
type: panos:MfaServerProfile
properties:
location:
template:
name: ${example.name}
name: rsa-mfa-profile
mfaCertProfile: ${mfaCa.name}
mfaVendorType: rsa-securid-access-v1
mfaConfigs:
- name: rsa-api-host
value: cloud.securid.com
- name: rsa-baseuri
value: https://tenant.rsa.com
- name: rsa-accesskey
value: abcdef1234567890ABCDEF1234567890
- name: rsa-accessid
value: RSAID123456
- name: rsa-assurancepolicyid
value: policy-abc-123-def-456
- name: rsa-timeout
value: '90'
Create MfaServerProfile Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new MfaServerProfile(name: string, args: MfaServerProfileArgs, opts?: CustomResourceOptions);@overload
def MfaServerProfile(resource_name: str,
args: MfaServerProfileArgs,
opts: Optional[ResourceOptions] = None)
@overload
def MfaServerProfile(resource_name: str,
opts: Optional[ResourceOptions] = None,
location: Optional[MfaServerProfileLocationArgs] = None,
mfa_cert_profile: Optional[str] = None,
mfa_configs: Optional[Sequence[MfaServerProfileMfaConfigArgs]] = None,
mfa_vendor_type: Optional[str] = None,
name: Optional[str] = None)func NewMfaServerProfile(ctx *Context, name string, args MfaServerProfileArgs, opts ...ResourceOption) (*MfaServerProfile, error)public MfaServerProfile(string name, MfaServerProfileArgs args, CustomResourceOptions? opts = null)
public MfaServerProfile(String name, MfaServerProfileArgs args)
public MfaServerProfile(String name, MfaServerProfileArgs args, CustomResourceOptions options)
type: panos:MfaServerProfile
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args MfaServerProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args MfaServerProfileArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args MfaServerProfileArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args MfaServerProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args MfaServerProfileArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var mfaServerProfileResource = new Panos.MfaServerProfile("mfaServerProfileResource", new()
{
Location = new Panos.Inputs.MfaServerProfileLocationArgs
{
Shared = null,
Template = new Panos.Inputs.MfaServerProfileLocationTemplateArgs
{
Name = "string",
PanoramaDevice = "string",
},
TemplateStack = new Panos.Inputs.MfaServerProfileLocationTemplateStackArgs
{
Name = "string",
PanoramaDevice = "string",
},
TemplateStackVsys = new Panos.Inputs.MfaServerProfileLocationTemplateStackVsysArgs
{
NgfwDevice = "string",
PanoramaDevice = "string",
TemplateStack = "string",
Vsys = "string",
},
TemplateVsys = new Panos.Inputs.MfaServerProfileLocationTemplateVsysArgs
{
NgfwDevice = "string",
PanoramaDevice = "string",
Template = "string",
Vsys = "string",
},
Vsys = new Panos.Inputs.MfaServerProfileLocationVsysArgs
{
Name = "string",
NgfwDevice = "string",
},
},
MfaCertProfile = "string",
MfaConfigs = new[]
{
new Panos.Inputs.MfaServerProfileMfaConfigArgs
{
Name = "string",
Value = "string",
},
},
MfaVendorType = "string",
Name = "string",
});
example, err := panos.NewMfaServerProfile(ctx, "mfaServerProfileResource", &panos.MfaServerProfileArgs{
Location: &panos.MfaServerProfileLocationArgs{
Shared: &panos.MfaServerProfileLocationSharedArgs{},
Template: &panos.MfaServerProfileLocationTemplateArgs{
Name: pulumi.String("string"),
PanoramaDevice: pulumi.String("string"),
},
TemplateStack: &panos.MfaServerProfileLocationTemplateStackArgs{
Name: pulumi.String("string"),
PanoramaDevice: pulumi.String("string"),
},
TemplateStackVsys: &panos.MfaServerProfileLocationTemplateStackVsysArgs{
NgfwDevice: pulumi.String("string"),
PanoramaDevice: pulumi.String("string"),
TemplateStack: pulumi.String("string"),
Vsys: pulumi.String("string"),
},
TemplateVsys: &panos.MfaServerProfileLocationTemplateVsysArgs{
NgfwDevice: pulumi.String("string"),
PanoramaDevice: pulumi.String("string"),
Template: pulumi.String("string"),
Vsys: pulumi.String("string"),
},
Vsys: &panos.MfaServerProfileLocationVsysArgs{
Name: pulumi.String("string"),
NgfwDevice: pulumi.String("string"),
},
},
MfaCertProfile: pulumi.String("string"),
MfaConfigs: panos.MfaServerProfileMfaConfigArray{
&panos.MfaServerProfileMfaConfigArgs{
Name: pulumi.String("string"),
Value: pulumi.String("string"),
},
},
MfaVendorType: pulumi.String("string"),
Name: pulumi.String("string"),
})
var mfaServerProfileResource = new MfaServerProfile("mfaServerProfileResource", MfaServerProfileArgs.builder()
.location(MfaServerProfileLocationArgs.builder()
.shared(MfaServerProfileLocationSharedArgs.builder()
.build())
.template(MfaServerProfileLocationTemplateArgs.builder()
.name("string")
.panoramaDevice("string")
.build())
.templateStack(MfaServerProfileLocationTemplateStackArgs.builder()
.name("string")
.panoramaDevice("string")
.build())
.templateStackVsys(MfaServerProfileLocationTemplateStackVsysArgs.builder()
.ngfwDevice("string")
.panoramaDevice("string")
.templateStack("string")
.vsys("string")
.build())
.templateVsys(MfaServerProfileLocationTemplateVsysArgs.builder()
.ngfwDevice("string")
.panoramaDevice("string")
.template("string")
.vsys("string")
.build())
.vsys(MfaServerProfileLocationVsysArgs.builder()
.name("string")
.ngfwDevice("string")
.build())
.build())
.mfaCertProfile("string")
.mfaConfigs(MfaServerProfileMfaConfigArgs.builder()
.name("string")
.value("string")
.build())
.mfaVendorType("string")
.name("string")
.build());
mfa_server_profile_resource = panos.MfaServerProfile("mfaServerProfileResource",
location={
"shared": {},
"template": {
"name": "string",
"panorama_device": "string",
},
"template_stack": {
"name": "string",
"panorama_device": "string",
},
"template_stack_vsys": {
"ngfw_device": "string",
"panorama_device": "string",
"template_stack": "string",
"vsys": "string",
},
"template_vsys": {
"ngfw_device": "string",
"panorama_device": "string",
"template": "string",
"vsys": "string",
},
"vsys": {
"name": "string",
"ngfw_device": "string",
},
},
mfa_cert_profile="string",
mfa_configs=[{
"name": "string",
"value": "string",
}],
mfa_vendor_type="string",
name="string")
const mfaServerProfileResource = new panos.MfaServerProfile("mfaServerProfileResource", {
location: {
shared: {},
template: {
name: "string",
panoramaDevice: "string",
},
templateStack: {
name: "string",
panoramaDevice: "string",
},
templateStackVsys: {
ngfwDevice: "string",
panoramaDevice: "string",
templateStack: "string",
vsys: "string",
},
templateVsys: {
ngfwDevice: "string",
panoramaDevice: "string",
template: "string",
vsys: "string",
},
vsys: {
name: "string",
ngfwDevice: "string",
},
},
mfaCertProfile: "string",
mfaConfigs: [{
name: "string",
value: "string",
}],
mfaVendorType: "string",
name: "string",
});
type: panos:MfaServerProfile
properties:
location:
shared: {}
template:
name: string
panoramaDevice: string
templateStack:
name: string
panoramaDevice: string
templateStackVsys:
ngfwDevice: string
panoramaDevice: string
templateStack: string
vsys: string
templateVsys:
ngfwDevice: string
panoramaDevice: string
template: string
vsys: string
vsys:
name: string
ngfwDevice: string
mfaCertProfile: string
mfaConfigs:
- name: string
value: string
mfaVendorType: string
name: string
MfaServerProfile Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The MfaServerProfile resource accepts the following input properties:
- Location
Mfa
Server Profile Location - The location of this object.
- Mfa
Cert stringProfile - Certificate profile for verifying the MFA Vendor
- Mfa
Configs List<MfaServer Profile Mfa Config> - Mfa
Vendor stringType - Vendor and product type
- Name string
- Location
Mfa
Server Profile Location Args - The location of this object.
- Mfa
Cert stringProfile - Certificate profile for verifying the MFA Vendor
- Mfa
Configs []MfaServer Profile Mfa Config Args - Mfa
Vendor stringType - Vendor and product type
- Name string
- location
Mfa
Server Profile Location - The location of this object.
- mfa
Cert StringProfile - Certificate profile for verifying the MFA Vendor
- mfa
Configs List<MfaServer Profile Mfa Config> - mfa
Vendor StringType - Vendor and product type
- name String
- location
Mfa
Server Profile Location - The location of this object.
- mfa
Cert stringProfile - Certificate profile for verifying the MFA Vendor
- mfa
Configs MfaServer Profile Mfa Config[] - mfa
Vendor stringType - Vendor and product type
- name string
- location
Mfa
Server Profile Location Args - The location of this object.
- mfa_
cert_ strprofile - Certificate profile for verifying the MFA Vendor
- mfa_
configs Sequence[MfaServer Profile Mfa Config Args] - mfa_
vendor_ strtype - Vendor and product type
- name str
- location Property Map
- The location of this object.
- mfa
Cert StringProfile - Certificate profile for verifying the MFA Vendor
- mfa
Configs List<Property Map> - mfa
Vendor StringType - Vendor and product type
- name String
Outputs
All input properties are implicitly available as output properties. Additionally, the MfaServerProfile resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing MfaServerProfile Resource
Get an existing MfaServerProfile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: MfaServerProfileState, opts?: CustomResourceOptions): MfaServerProfile@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
location: Optional[MfaServerProfileLocationArgs] = None,
mfa_cert_profile: Optional[str] = None,
mfa_configs: Optional[Sequence[MfaServerProfileMfaConfigArgs]] = None,
mfa_vendor_type: Optional[str] = None,
name: Optional[str] = None) -> MfaServerProfilefunc GetMfaServerProfile(ctx *Context, name string, id IDInput, state *MfaServerProfileState, opts ...ResourceOption) (*MfaServerProfile, error)public static MfaServerProfile Get(string name, Input<string> id, MfaServerProfileState? state, CustomResourceOptions? opts = null)public static MfaServerProfile get(String name, Output<String> id, MfaServerProfileState state, CustomResourceOptions options)resources: _: type: panos:MfaServerProfile get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Location
Mfa
Server Profile Location - The location of this object.
- Mfa
Cert stringProfile - Certificate profile for verifying the MFA Vendor
- Mfa
Configs List<MfaServer Profile Mfa Config> - Mfa
Vendor stringType - Vendor and product type
- Name string
- Location
Mfa
Server Profile Location Args - The location of this object.
- Mfa
Cert stringProfile - Certificate profile for verifying the MFA Vendor
- Mfa
Configs []MfaServer Profile Mfa Config Args - Mfa
Vendor stringType - Vendor and product type
- Name string
- location
Mfa
Server Profile Location - The location of this object.
- mfa
Cert StringProfile - Certificate profile for verifying the MFA Vendor
- mfa
Configs List<MfaServer Profile Mfa Config> - mfa
Vendor StringType - Vendor and product type
- name String
- location
Mfa
Server Profile Location - The location of this object.
- mfa
Cert stringProfile - Certificate profile for verifying the MFA Vendor
- mfa
Configs MfaServer Profile Mfa Config[] - mfa
Vendor stringType - Vendor and product type
- name string
- location
Mfa
Server Profile Location Args - The location of this object.
- mfa_
cert_ strprofile - Certificate profile for verifying the MFA Vendor
- mfa_
configs Sequence[MfaServer Profile Mfa Config Args] - mfa_
vendor_ strtype - Vendor and product type
- name str
- location Property Map
- The location of this object.
- mfa
Cert StringProfile - Certificate profile for verifying the MFA Vendor
- mfa
Configs List<Property Map> - mfa
Vendor StringType - Vendor and product type
- name String
Supporting Types
MfaServerProfileLocation, MfaServerProfileLocationArgs
-
Mfa
Server Profile Location Shared - Panorama shared object
- Template
Mfa
Server Profile Location Template - A shared resource located within a specific template
- Template
Stack MfaServer Profile Location Template Stack - Located in a specific template
- Template
Stack MfaVsys Server Profile Location Template Stack Vsys - Located in a specific template, device and vsys.
- Template
Vsys MfaServer Profile Location Template Vsys - Located in a specific template, device and vsys.
- Vsys
Mfa
Server Profile Location Vsys - Located in a specific Virtual System
-
Mfa
Server Profile Location Shared - Panorama shared object
- Template
Mfa
Server Profile Location Template - A shared resource located within a specific template
- Template
Stack MfaServer Profile Location Template Stack - Located in a specific template
- Template
Stack MfaVsys Server Profile Location Template Stack Vsys - Located in a specific template, device and vsys.
- Template
Vsys MfaServer Profile Location Template Vsys - Located in a specific template, device and vsys.
- Vsys
Mfa
Server Profile Location Vsys - Located in a specific Virtual System
-
Mfa
Server Profile Location Shared - Panorama shared object
- template
Mfa
Server Profile Location Template - A shared resource located within a specific template
- template
Stack MfaServer Profile Location Template Stack - Located in a specific template
- template
Stack MfaVsys Server Profile Location Template Stack Vsys - Located in a specific template, device and vsys.
- template
Vsys MfaServer Profile Location Template Vsys - Located in a specific template, device and vsys.
- vsys
Mfa
Server Profile Location Vsys - Located in a specific Virtual System
-
Mfa
Server Profile Location Shared - Panorama shared object
- template
Mfa
Server Profile Location Template - A shared resource located within a specific template
- template
Stack MfaServer Profile Location Template Stack - Located in a specific template
- template
Stack MfaVsys Server Profile Location Template Stack Vsys - Located in a specific template, device and vsys.
- template
Vsys MfaServer Profile Location Template Vsys - Located in a specific template, device and vsys.
- vsys
Mfa
Server Profile Location Vsys - Located in a specific Virtual System
-
Mfa
Server Profile Location Shared - Panorama shared object
- template
Mfa
Server Profile Location Template - A shared resource located within a specific template
- template_
stack MfaServer Profile Location Template Stack - Located in a specific template
- template_
stack_ Mfavsys Server Profile Location Template Stack Vsys - Located in a specific template, device and vsys.
- template_
vsys MfaServer Profile Location Template Vsys - Located in a specific template, device and vsys.
- vsys
Mfa
Server Profile Location Vsys - Located in a specific Virtual System
- Property Map
- Panorama shared object
- template Property Map
- A shared resource located within a specific template
- template
Stack Property Map - Located in a specific template
- template
Stack Property MapVsys - Located in a specific template, device and vsys.
- template
Vsys Property Map - Located in a specific template, device and vsys.
- vsys Property Map
- Located in a specific Virtual System
MfaServerProfileLocationTemplate, MfaServerProfileLocationTemplateArgs
- Name string
- Specific Panorama template
- Panorama
Device string - Specific Panorama device
- Name string
- Specific Panorama template
- Panorama
Device string - Specific Panorama device
- name String
- Specific Panorama template
- panorama
Device String - Specific Panorama device
- name string
- Specific Panorama template
- panorama
Device string - Specific Panorama device
- name str
- Specific Panorama template
- panorama_
device str - Specific Panorama device
- name String
- Specific Panorama template
- panorama
Device String - Specific Panorama device
MfaServerProfileLocationTemplateStack, MfaServerProfileLocationTemplateStackArgs
- Name string
- The template stack
- Panorama
Device string - Specific Panorama device
- Name string
- The template stack
- Panorama
Device string - Specific Panorama device
- name String
- The template stack
- panorama
Device String - Specific Panorama device
- name string
- The template stack
- panorama
Device string - Specific Panorama device
- name str
- The template stack
- panorama_
device str - Specific Panorama device
- name String
- The template stack
- panorama
Device String - Specific Panorama device
MfaServerProfileLocationTemplateStackVsys, MfaServerProfileLocationTemplateStackVsysArgs
- Ngfw
Device string - The NGFW device
- Panorama
Device string - Specific Panorama device
- Template
Stack string - The template stack
- Vsys string
- The vsys.
- Ngfw
Device string - The NGFW device
- Panorama
Device string - Specific Panorama device
- Template
Stack string - The template stack
- Vsys string
- The vsys.
- ngfw
Device String - The NGFW device
- panorama
Device String - Specific Panorama device
- template
Stack String - The template stack
- vsys String
- The vsys.
- ngfw
Device string - The NGFW device
- panorama
Device string - Specific Panorama device
- template
Stack string - The template stack
- vsys string
- The vsys.
- ngfw_
device str - The NGFW device
- panorama_
device str - Specific Panorama device
- template_
stack str - The template stack
- vsys str
- The vsys.
- ngfw
Device String - The NGFW device
- panorama
Device String - Specific Panorama device
- template
Stack String - The template stack
- vsys String
- The vsys.
MfaServerProfileLocationTemplateVsys, MfaServerProfileLocationTemplateVsysArgs
- Ngfw
Device string - The NGFW device
- Panorama
Device string - Specific Panorama device
- Template string
- Specific Panorama template
- Vsys string
- The vsys.
- Ngfw
Device string - The NGFW device
- Panorama
Device string - Specific Panorama device
- Template string
- Specific Panorama template
- Vsys string
- The vsys.
- ngfw
Device String - The NGFW device
- panorama
Device String - Specific Panorama device
- template String
- Specific Panorama template
- vsys String
- The vsys.
- ngfw
Device string - The NGFW device
- panorama
Device string - Specific Panorama device
- template string
- Specific Panorama template
- vsys string
- The vsys.
- ngfw_
device str - The NGFW device
- panorama_
device str - Specific Panorama device
- template str
- Specific Panorama template
- vsys str
- The vsys.
- ngfw
Device String - The NGFW device
- panorama
Device String - Specific Panorama device
- template String
- Specific Panorama template
- vsys String
- The vsys.
MfaServerProfileLocationVsys, MfaServerProfileLocationVsysArgs
- Name string
- The Virtual System name
- Ngfw
Device string - The NGFW device name
- Name string
- The Virtual System name
- Ngfw
Device string - The NGFW device name
- name String
- The Virtual System name
- ngfw
Device String - The NGFW device name
- name string
- The Virtual System name
- ngfw
Device string - The NGFW device name
- name str
- The Virtual System name
- ngfw_
device str - The NGFW device name
- name String
- The Virtual System name
- ngfw
Device String - The NGFW device name
MfaServerProfileMfaConfig, MfaServerProfileMfaConfigArgs
Import
An MFA server profile can be imported by providing the following base64 encoded object as the ID
{
location = {
template = {
name = "mfa-template"
panorama_device = "localhost.localdomain"
}
}
name = “okta-mfa-profile”
}
$ pulumi import panos:index/mfaServerProfile:MfaServerProfile example $(echo '{"location":{"template":{"name":"mfa-template","panorama_device":"localhost.localdomain"}},"name":"okta-mfa-profile"}' | base64)
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- panos paloaltonetworks/terraform-provider-panos
- License
- Notes
- This Pulumi package is based on the
panosTerraform Provider.
published on Tuesday, Apr 28, 2026 by paloaltonetworks
