vcd.OrgOidc
Explore with Pulumi AI
Create OrgOidc Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new OrgOidc(name: string, args: OrgOidcArgs, opts?: CustomResourceOptions);
@overload
def OrgOidc(resource_name: str,
args: OrgOidcArgs,
opts: Optional[ResourceOptions] = None)
@overload
def OrgOidc(resource_name: str,
opts: Optional[ResourceOptions] = None,
enabled: Optional[bool] = None,
org_id: Optional[str] = None,
client_id: Optional[str] = None,
client_secret: Optional[str] = None,
keys: Optional[Sequence[OrgOidcKeyArgs]] = None,
max_clock_skew_seconds: Optional[float] = None,
key_expire_duration_hours: Optional[float] = None,
key_refresh_endpoint: Optional[str] = None,
key_refresh_period_hours: Optional[float] = None,
key_refresh_strategy: Optional[str] = None,
access_token_endpoint: Optional[str] = None,
issuer_id: Optional[str] = None,
claims_mapping: Optional[OrgOidcClaimsMappingArgs] = None,
org_oidc_id: Optional[str] = None,
prefer_id_token: Optional[bool] = None,
scopes: Optional[Sequence[str]] = None,
ui_button_label: Optional[str] = None,
user_authorization_endpoint: Optional[str] = None,
userinfo_endpoint: Optional[str] = None,
wellknown_endpoint: Optional[str] = None)
func NewOrgOidc(ctx *Context, name string, args OrgOidcArgs, opts ...ResourceOption) (*OrgOidc, error)
public OrgOidc(string name, OrgOidcArgs args, CustomResourceOptions? opts = null)
public OrgOidc(String name, OrgOidcArgs args)
public OrgOidc(String name, OrgOidcArgs args, CustomResourceOptions options)
type: vcd:OrgOidc
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args OrgOidcArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args OrgOidcArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args OrgOidcArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args OrgOidcArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args OrgOidcArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var orgOidcResource = new Vcd.OrgOidc("orgOidcResource", new()
{
Enabled = false,
OrgId = "string",
ClientId = "string",
ClientSecret = "string",
Keys = new[]
{
new Vcd.Inputs.OrgOidcKeyArgs
{
Algorithm = "string",
Certificate = "string",
Id = "string",
ExpirationDate = "string",
},
},
MaxClockSkewSeconds = 0,
KeyExpireDurationHours = 0,
KeyRefreshEndpoint = "string",
KeyRefreshPeriodHours = 0,
KeyRefreshStrategy = "string",
AccessTokenEndpoint = "string",
IssuerId = "string",
ClaimsMapping = new Vcd.Inputs.OrgOidcClaimsMappingArgs
{
Email = "string",
FirstName = "string",
FullName = "string",
Groups = "string",
LastName = "string",
Roles = "string",
Subject = "string",
},
OrgOidcId = "string",
PreferIdToken = false,
Scopes = new[]
{
"string",
},
UiButtonLabel = "string",
UserAuthorizationEndpoint = "string",
UserinfoEndpoint = "string",
WellknownEndpoint = "string",
});
example, err := vcd.NewOrgOidc(ctx, "orgOidcResource", &vcd.OrgOidcArgs{
Enabled: pulumi.Bool(false),
OrgId: pulumi.String("string"),
ClientId: pulumi.String("string"),
ClientSecret: pulumi.String("string"),
Keys: vcd.OrgOidcKeyArray{
&vcd.OrgOidcKeyArgs{
Algorithm: pulumi.String("string"),
Certificate: pulumi.String("string"),
Id: pulumi.String("string"),
ExpirationDate: pulumi.String("string"),
},
},
MaxClockSkewSeconds: pulumi.Float64(0),
KeyExpireDurationHours: pulumi.Float64(0),
KeyRefreshEndpoint: pulumi.String("string"),
KeyRefreshPeriodHours: pulumi.Float64(0),
KeyRefreshStrategy: pulumi.String("string"),
AccessTokenEndpoint: pulumi.String("string"),
IssuerId: pulumi.String("string"),
ClaimsMapping: &vcd.OrgOidcClaimsMappingArgs{
Email: pulumi.String("string"),
FirstName: pulumi.String("string"),
FullName: pulumi.String("string"),
Groups: pulumi.String("string"),
LastName: pulumi.String("string"),
Roles: pulumi.String("string"),
Subject: pulumi.String("string"),
},
OrgOidcId: pulumi.String("string"),
PreferIdToken: pulumi.Bool(false),
Scopes: pulumi.StringArray{
pulumi.String("string"),
},
UiButtonLabel: pulumi.String("string"),
UserAuthorizationEndpoint: pulumi.String("string"),
UserinfoEndpoint: pulumi.String("string"),
WellknownEndpoint: pulumi.String("string"),
})
var orgOidcResource = new OrgOidc("orgOidcResource", OrgOidcArgs.builder()
.enabled(false)
.orgId("string")
.clientId("string")
.clientSecret("string")
.keys(OrgOidcKeyArgs.builder()
.algorithm("string")
.certificate("string")
.id("string")
.expirationDate("string")
.build())
.maxClockSkewSeconds(0)
.keyExpireDurationHours(0)
.keyRefreshEndpoint("string")
.keyRefreshPeriodHours(0)
.keyRefreshStrategy("string")
.accessTokenEndpoint("string")
.issuerId("string")
.claimsMapping(OrgOidcClaimsMappingArgs.builder()
.email("string")
.firstName("string")
.fullName("string")
.groups("string")
.lastName("string")
.roles("string")
.subject("string")
.build())
.orgOidcId("string")
.preferIdToken(false)
.scopes("string")
.uiButtonLabel("string")
.userAuthorizationEndpoint("string")
.userinfoEndpoint("string")
.wellknownEndpoint("string")
.build());
org_oidc_resource = vcd.OrgOidc("orgOidcResource",
enabled=False,
org_id="string",
client_id="string",
client_secret="string",
keys=[{
"algorithm": "string",
"certificate": "string",
"id": "string",
"expiration_date": "string",
}],
max_clock_skew_seconds=0,
key_expire_duration_hours=0,
key_refresh_endpoint="string",
key_refresh_period_hours=0,
key_refresh_strategy="string",
access_token_endpoint="string",
issuer_id="string",
claims_mapping={
"email": "string",
"first_name": "string",
"full_name": "string",
"groups": "string",
"last_name": "string",
"roles": "string",
"subject": "string",
},
org_oidc_id="string",
prefer_id_token=False,
scopes=["string"],
ui_button_label="string",
user_authorization_endpoint="string",
userinfo_endpoint="string",
wellknown_endpoint="string")
const orgOidcResource = new vcd.OrgOidc("orgOidcResource", {
enabled: false,
orgId: "string",
clientId: "string",
clientSecret: "string",
keys: [{
algorithm: "string",
certificate: "string",
id: "string",
expirationDate: "string",
}],
maxClockSkewSeconds: 0,
keyExpireDurationHours: 0,
keyRefreshEndpoint: "string",
keyRefreshPeriodHours: 0,
keyRefreshStrategy: "string",
accessTokenEndpoint: "string",
issuerId: "string",
claimsMapping: {
email: "string",
firstName: "string",
fullName: "string",
groups: "string",
lastName: "string",
roles: "string",
subject: "string",
},
orgOidcId: "string",
preferIdToken: false,
scopes: ["string"],
uiButtonLabel: "string",
userAuthorizationEndpoint: "string",
userinfoEndpoint: "string",
wellknownEndpoint: "string",
});
type: vcd:OrgOidc
properties:
accessTokenEndpoint: string
claimsMapping:
email: string
firstName: string
fullName: string
groups: string
lastName: string
roles: string
subject: string
clientId: string
clientSecret: string
enabled: false
issuerId: string
keyExpireDurationHours: 0
keyRefreshEndpoint: string
keyRefreshPeriodHours: 0
keyRefreshStrategy: string
keys:
- algorithm: string
certificate: string
expirationDate: string
id: string
maxClockSkewSeconds: 0
orgId: string
orgOidcId: string
preferIdToken: false
scopes:
- string
uiButtonLabel: string
userAuthorizationEndpoint: string
userinfoEndpoint: string
wellknownEndpoint: string
OrgOidc Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The OrgOidc resource accepts the following input properties:
- Client
Id string - Client ID to use with the OIDC provider
- Client
Secret string - Client Secret to use with the OIDC provider
- Enabled bool
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - Org
Id string - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - Access
Token stringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Claims
Mapping OrgOidc Claims Mapping - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - Issuer
Id string - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Key
Expire doubleDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- Key
Refresh stringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - Key
Refresh doublePeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - Key
Refresh stringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - Keys
List<Org
Oidc Key> - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - Max
Clock doubleSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - Org
Oidc stringId - Prefer
Id boolToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - Scopes List<string>
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- string
- Customizes the label of the UI button of the login screen
- string
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Userinfo
Endpoint string - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Wellknown
Endpoint string - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- Client
Id string - Client ID to use with the OIDC provider
- Client
Secret string - Client Secret to use with the OIDC provider
- Enabled bool
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - Org
Id string - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - Access
Token stringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Claims
Mapping OrgOidc Claims Mapping Args - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - Issuer
Id string - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Key
Expire float64Duration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- Key
Refresh stringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - Key
Refresh float64Period Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - Key
Refresh stringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - Keys
[]Org
Oidc Key Args - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - Max
Clock float64Skew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - Org
Oidc stringId - Prefer
Id boolToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - Scopes []string
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- string
- Customizes the label of the UI button of the login screen
- string
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Userinfo
Endpoint string - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Wellknown
Endpoint string - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- client
Id String - Client ID to use with the OIDC provider
- client
Secret String - Client Secret to use with the OIDC provider
- enabled Boolean
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - org
Id String - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - access
Token StringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims
Mapping OrgOidc Claims Mapping - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - issuer
Id String - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key
Expire DoubleDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key
Refresh StringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key
Refresh DoublePeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key
Refresh StringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys
List<Org
Oidc Key> - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max
Clock DoubleSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org
Oidc StringId - prefer
Id BooleanToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - scopes List<String>
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- String
- Customizes the label of the UI button of the login screen
- String
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo
Endpoint String - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown
Endpoint String - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- client
Id string - Client ID to use with the OIDC provider
- client
Secret string - Client Secret to use with the OIDC provider
- enabled boolean
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - org
Id string - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - access
Token stringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims
Mapping OrgOidc Claims Mapping - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - issuer
Id string - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key
Expire numberDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key
Refresh stringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key
Refresh numberPeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key
Refresh stringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys
Org
Oidc Key[] - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max
Clock numberSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org
Oidc stringId - prefer
Id booleanToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - scopes string[]
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- string
- Customizes the label of the UI button of the login screen
- string
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo
Endpoint string - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown
Endpoint string - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- client_
id str - Client ID to use with the OIDC provider
- client_
secret str - Client Secret to use with the OIDC provider
- enabled bool
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - org_
id str - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - access_
token_ strendpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims_
mapping OrgOidc Claims Mapping Args - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - issuer_
id str - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key_
expire_ floatduration_ hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key_
refresh_ strendpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key_
refresh_ floatperiod_ hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key_
refresh_ strstrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys
Sequence[Org
Oidc Key Args] - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max_
clock_ floatskew_ seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org_
oidc_ strid - prefer_
id_ booltoken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - scopes Sequence[str]
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- str
- Customizes the label of the UI button of the login screen
- str
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo_
endpoint str - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown_
endpoint str - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- client
Id String - Client ID to use with the OIDC provider
- client
Secret String - Client Secret to use with the OIDC provider
- enabled Boolean
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - org
Id String - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - access
Token StringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims
Mapping Property Map - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - issuer
Id String - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key
Expire NumberDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key
Refresh StringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key
Refresh NumberPeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key
Refresh StringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys List<Property Map>
- One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max
Clock NumberSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org
Oidc StringId - prefer
Id BooleanToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - scopes List<String>
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- String
- Customizes the label of the UI button of the login screen
- String
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo
Endpoint String - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown
Endpoint String - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
Outputs
All input properties are implicitly available as output properties. Additionally, the OrgOidc resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Redirect
Uri string - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- Id string
- The provider-assigned unique ID for this managed resource.
- Redirect
Uri string - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- id String
- The provider-assigned unique ID for this managed resource.
- redirect
Uri String - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- id string
- The provider-assigned unique ID for this managed resource.
- redirect
Uri string - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- id str
- The provider-assigned unique ID for this managed resource.
- redirect_
uri str - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- id String
- The provider-assigned unique ID for this managed resource.
- redirect
Uri String - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
Look up Existing OrgOidc Resource
Get an existing OrgOidc resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: OrgOidcState, opts?: CustomResourceOptions): OrgOidc
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_token_endpoint: Optional[str] = None,
claims_mapping: Optional[OrgOidcClaimsMappingArgs] = None,
client_id: Optional[str] = None,
client_secret: Optional[str] = None,
enabled: Optional[bool] = None,
issuer_id: Optional[str] = None,
key_expire_duration_hours: Optional[float] = None,
key_refresh_endpoint: Optional[str] = None,
key_refresh_period_hours: Optional[float] = None,
key_refresh_strategy: Optional[str] = None,
keys: Optional[Sequence[OrgOidcKeyArgs]] = None,
max_clock_skew_seconds: Optional[float] = None,
org_id: Optional[str] = None,
org_oidc_id: Optional[str] = None,
prefer_id_token: Optional[bool] = None,
redirect_uri: Optional[str] = None,
scopes: Optional[Sequence[str]] = None,
ui_button_label: Optional[str] = None,
user_authorization_endpoint: Optional[str] = None,
userinfo_endpoint: Optional[str] = None,
wellknown_endpoint: Optional[str] = None) -> OrgOidc
func GetOrgOidc(ctx *Context, name string, id IDInput, state *OrgOidcState, opts ...ResourceOption) (*OrgOidc, error)
public static OrgOidc Get(string name, Input<string> id, OrgOidcState? state, CustomResourceOptions? opts = null)
public static OrgOidc get(String name, Output<String> id, OrgOidcState state, CustomResourceOptions options)
resources: _: type: vcd:OrgOidc get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Token stringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Claims
Mapping OrgOidc Claims Mapping - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - Client
Id string - Client ID to use with the OIDC provider
- Client
Secret string - Client Secret to use with the OIDC provider
- Enabled bool
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - Issuer
Id string - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Key
Expire doubleDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- Key
Refresh stringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - Key
Refresh doublePeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - Key
Refresh stringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - Keys
List<Org
Oidc Key> - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - Max
Clock doubleSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - Org
Id string - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - Org
Oidc stringId - Prefer
Id boolToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - Redirect
Uri string - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- Scopes List<string>
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- string
- Customizes the label of the UI button of the login screen
- string
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Userinfo
Endpoint string - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Wellknown
Endpoint string - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- Access
Token stringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Claims
Mapping OrgOidc Claims Mapping Args - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - Client
Id string - Client ID to use with the OIDC provider
- Client
Secret string - Client Secret to use with the OIDC provider
- Enabled bool
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - Issuer
Id string - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Key
Expire float64Duration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- Key
Refresh stringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - Key
Refresh float64Period Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - Key
Refresh stringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - Keys
[]Org
Oidc Key Args - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - Max
Clock float64Skew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - Org
Id string - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - Org
Oidc stringId - Prefer
Id boolToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - Redirect
Uri string - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- Scopes []string
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- string
- Customizes the label of the UI button of the login screen
- string
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Userinfo
Endpoint string - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- Wellknown
Endpoint string - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- access
Token StringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims
Mapping OrgOidc Claims Mapping - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - client
Id String - Client ID to use with the OIDC provider
- client
Secret String - Client Secret to use with the OIDC provider
- enabled Boolean
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - issuer
Id String - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key
Expire DoubleDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key
Refresh StringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key
Refresh DoublePeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key
Refresh StringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys
List<Org
Oidc Key> - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max
Clock DoubleSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org
Id String - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - org
Oidc StringId - prefer
Id BooleanToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - redirect
Uri String - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- scopes List<String>
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- String
- Customizes the label of the UI button of the login screen
- String
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo
Endpoint String - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown
Endpoint String - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- access
Token stringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims
Mapping OrgOidc Claims Mapping - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - client
Id string - Client ID to use with the OIDC provider
- client
Secret string - Client Secret to use with the OIDC provider
- enabled boolean
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - issuer
Id string - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key
Expire numberDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key
Refresh stringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key
Refresh numberPeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key
Refresh stringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys
Org
Oidc Key[] - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max
Clock numberSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org
Id string - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - org
Oidc stringId - prefer
Id booleanToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - redirect
Uri string - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- scopes string[]
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- string
- Customizes the label of the UI button of the login screen
- string
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo
Endpoint string - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown
Endpoint string - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- access_
token_ strendpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims_
mapping OrgOidc Claims Mapping Args - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - client_
id str - Client ID to use with the OIDC provider
- client_
secret str - Client Secret to use with the OIDC provider
- enabled bool
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - issuer_
id str - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key_
expire_ floatduration_ hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key_
refresh_ strendpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key_
refresh_ floatperiod_ hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key_
refresh_ strstrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys
Sequence[Org
Oidc Key Args] - One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max_
clock_ floatskew_ seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org_
id str - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - org_
oidc_ strid - prefer_
id_ booltoken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - redirect_
uri str - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- scopes Sequence[str]
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- str
- Customizes the label of the UI button of the login screen
- str
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo_
endpoint str - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown_
endpoint str - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
- access
Token StringEndpoint - The endpoint to use for access tokens.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- claims
Mapping Property Map - A single configuration block that specifies the claim mappings to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the claims given bywellknown_endpoint
. The supported claims are: - client
Id String - Client ID to use with the OIDC provider
- client
Secret String - Client Secret to use with the OIDC provider
- enabled Boolean
- Either
true
orfalse
, specifies whether the OIDC authentication is enabled for the given organization - issuer
Id String - The issuer ID for the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- key
Expire NumberDuration Hours - Required if
key_refresh_endpoint
is set andkey_refresh_strategy=EXPIRE_AFTER
. Defines the expiration period of the key You can get more details of theEXPIRE_AFTER
strategy here. Maximum value is24
- key
Refresh StringEndpoint - Endpoint used to refresh the keys. If set,
key_refresh_period_hours
andkey_refresh_strategy
will be required. Ifwellknown_endpoint
is set, then this argument will override the obtained endpoint - key
Refresh NumberPeriod Hours - Required if
key_refresh_endpoint
is set. Defines the frequency of key refresh. Maximum value is720
(30 days) - key
Refresh StringStrategy - Required if
key_refresh_endpoint
is set. Defines the strategy of key refresh. One ofADD
,REPLACE
,EXPIRE_AFTER
. The different strategies are explained here - keys List<Property Map>
- One or more configuration blocks that specify the keys to use with the OIDC provider.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the keys given bywellknown_endpoint
. Each key requires the following: - max
Clock NumberSkew Seconds - The maximum clock skew is the maximum allowable time difference between the client and server.
This time compensates for any small-time differences in the timestamps when verifying tokens. The default value is
60
seconds - org
Id String - ID of the Organization that will have the OpenID Connect settings configured. There must be only one
resource
vcd.OrgOidc
perorg_id
, as there is only one OpenID configuration per Organization - org
Oidc StringId - prefer
Id BooleanToken - If you want to combine claims from
userinfo_endpoint
and the ID Token, set this totrue
. The identity providers do not provide all the required claims set inuserinfo_endpoint
. By setting this argument totrue
, VMware Cloud Director can fetch and consume claims from both sources - redirect
Uri String - The client configuration redirect URI used to create a client application registration with an identity provider that complies with the OpenID Connect standard
- scopes List<String>
- A set of scopes to use with the OpenID Connect provider. They are used to authorize access to user details, by defining the permissions that the access tokens have to access user information. If 'wellknown_endpoint' is set, this attribute overrides the obtained scopes
- String
- Customizes the label of the UI button of the login screen
- String
- The endpoint to use for authorization.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- userinfo
Endpoint String - The endpoint to use for User Info.
If
wellknown_endpoint
is not set, then this argument is required. Otherwise, it is optional. This allows users to override the configuration given bywellknown_endpoint
- wellknown
Endpoint String - This endpoint retrieves the OIDC provider configuration and automatically sets
the following arguments, without setting them explicitly:
issuer_id
,user_authorization_endpoint
,access_token_endpoint
,userinfo_endpoint
, theclaims_mapping
block, thekey
blocks, andscopes
. These mentioned attributes will be computed, and can be overridden by setting them explicitly in HCL code
Supporting Types
OrgOidcClaimsMapping, OrgOidcClaimsMappingArgs
- Email string
- Required if
wellknown_endpoint
doesn't give info about it - First
Name string - Required if
wellknown_endpoint
doesn't give info about it - Full
Name string - Required if
wellknown_endpoint
doesn't give info about it - Groups string
- Optional
- Last
Name string - Required if
wellknown_endpoint
doesn't give info about it - Roles string
- Optional
- Subject string
- Required if
wellknown_endpoint
doesn't give info about it
- Email string
- Required if
wellknown_endpoint
doesn't give info about it - First
Name string - Required if
wellknown_endpoint
doesn't give info about it - Full
Name string - Required if
wellknown_endpoint
doesn't give info about it - Groups string
- Optional
- Last
Name string - Required if
wellknown_endpoint
doesn't give info about it - Roles string
- Optional
- Subject string
- Required if
wellknown_endpoint
doesn't give info about it
- email String
- Required if
wellknown_endpoint
doesn't give info about it - first
Name String - Required if
wellknown_endpoint
doesn't give info about it - full
Name String - Required if
wellknown_endpoint
doesn't give info about it - groups String
- Optional
- last
Name String - Required if
wellknown_endpoint
doesn't give info about it - roles String
- Optional
- subject String
- Required if
wellknown_endpoint
doesn't give info about it
- email string
- Required if
wellknown_endpoint
doesn't give info about it - first
Name string - Required if
wellknown_endpoint
doesn't give info about it - full
Name string - Required if
wellknown_endpoint
doesn't give info about it - groups string
- Optional
- last
Name string - Required if
wellknown_endpoint
doesn't give info about it - roles string
- Optional
- subject string
- Required if
wellknown_endpoint
doesn't give info about it
- email str
- Required if
wellknown_endpoint
doesn't give info about it - first_
name str - Required if
wellknown_endpoint
doesn't give info about it - full_
name str - Required if
wellknown_endpoint
doesn't give info about it - groups str
- Optional
- last_
name str - Required if
wellknown_endpoint
doesn't give info about it - roles str
- Optional
- subject str
- Required if
wellknown_endpoint
doesn't give info about it
- email String
- Required if
wellknown_endpoint
doesn't give info about it - first
Name String - Required if
wellknown_endpoint
doesn't give info about it - full
Name String - Required if
wellknown_endpoint
doesn't give info about it - groups String
- Optional
- last
Name String - Required if
wellknown_endpoint
doesn't give info about it - roles String
- Optional
- subject String
- Required if
wellknown_endpoint
doesn't give info about it
OrgOidcKey, OrgOidcKeyArgs
- Algorithm string
- Algorithm used by the key. Can be
RSA
orEC
- Certificate string
- The contents of a PEM file to create/update the key
- Id string
- Identifier of the key
- Expiration
Date string - Expiration date for the key. The accepted format is
YYYY-MM-DD
, like2077-12-31
- Algorithm string
- Algorithm used by the key. Can be
RSA
orEC
- Certificate string
- The contents of a PEM file to create/update the key
- Id string
- Identifier of the key
- Expiration
Date string - Expiration date for the key. The accepted format is
YYYY-MM-DD
, like2077-12-31
- algorithm String
- Algorithm used by the key. Can be
RSA
orEC
- certificate String
- The contents of a PEM file to create/update the key
- id String
- Identifier of the key
- expiration
Date String - Expiration date for the key. The accepted format is
YYYY-MM-DD
, like2077-12-31
- algorithm string
- Algorithm used by the key. Can be
RSA
orEC
- certificate string
- The contents of a PEM file to create/update the key
- id string
- Identifier of the key
- expiration
Date string - Expiration date for the key. The accepted format is
YYYY-MM-DD
, like2077-12-31
- algorithm str
- Algorithm used by the key. Can be
RSA
orEC
- certificate str
- The contents of a PEM file to create/update the key
- id str
- Identifier of the key
- expiration_
date str - Expiration date for the key. The accepted format is
YYYY-MM-DD
, like2077-12-31
- algorithm String
- Algorithm used by the key. Can be
RSA
orEC
- certificate String
- The contents of a PEM file to create/update the key
- id String
- Identifier of the key
- expiration
Date String - Expiration date for the key. The accepted format is
YYYY-MM-DD
, like2077-12-31
Package Details
- Repository
- vcd vmware/terraform-provider-vcd
- License
- Notes
- This Pulumi package is based on the
vcd
Terraform Provider.