1. Packages
  2. Zscaler Internet Access (ZIA)
  3. API Docs
  4. AdminUsers
Zscaler Internet Access v0.0.6 published on Wednesday, Apr 10, 2024 by Zscaler

zia.AdminUsers

Explore with Pulumi AI

zia logo
Zscaler Internet Access v0.0.6 published on Wednesday, Apr 10, 2024 by Zscaler

    The zia_admin_users resource allows the creation and management of ZIA admin user account created in the Zscaler Internet Access cloud or via the API.

    Example Usage

    Organization Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "ORGANIZATION",
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="ORGANIZATION")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("ORGANIZATION"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "ORGANIZATION",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("ORGANIZATION")
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: ORGANIZATION
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
    

    Department Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    const engineering = zia.getDepartmentManagement({
        name: "Engineering",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "DEPARTMENT",
        adminScopeEntities: {
            ids: [
                engineering.then(engineering => engineering.id),
                data.zia_department_management.sales.id,
            ],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    engineering = zia.get_department_management(name="Engineering")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="DEPARTMENT",
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[
                engineering.id,
                data["zia_department_management"]["sales"]["id"],
            ],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		engineering, err := zia.GetDepartmentManagement(ctx, &zia.GetDepartmentManagementArgs{
    			Name: pulumi.StringRef("Engineering"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("DEPARTMENT"),
    			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(engineering.Id),
    					data.Zia_department_management.Sales.Id,
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        var engineering = Zia.GetDepartmentManagement.Invoke(new()
        {
            Name = "Engineering",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "DEPARTMENT",
            AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
            {
                Ids = new[]
                {
                    engineering.Apply(getDepartmentManagementResult => getDepartmentManagementResult.Id),
                    data.Zia_department_management.Sales.Id,
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.inputs.GetDepartmentManagementArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            final var engineering = ZiaFunctions.getDepartmentManagement(GetDepartmentManagementArgs.builder()
                .name("Engineering")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("DEPARTMENT")
                .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                    .ids(                
                        engineering.applyValue(getDepartmentManagementResult -> getDepartmentManagementResult.id()),
                        data.zia_department_management().sales().id())
                    .build())
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: DEPARTMENT
          adminScopeEntities:
            ids:
              - ${engineering.id}
              - ${data.zia_department_management.sales.id}
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
      engineering:
        fn::invoke:
          Function: zia:getDepartmentManagement
          Arguments:
            name: Engineering
    

    Location Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    const auSydneyBranch01 = zia.getLocationManagement({
        name: "AU - Sydney - Branch01",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "LOCATION",
        adminScopeEntities: {
            ids: [auSydneyBranch01.then(auSydneyBranch01 => auSydneyBranch01.id)],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    au_sydney_branch01 = zia.get_location_management(name="AU - Sydney - Branch01")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="LOCATION",
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[au_sydney_branch01.id],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		auSydneyBranch01, err := zia.LookupLocationManagement(ctx, &zia.LookupLocationManagementArgs{
    			Name: pulumi.StringRef("AU - Sydney - Branch01"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("LOCATION"),
    			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(auSydneyBranch01.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        var auSydneyBranch01 = Zia.GetLocationManagement.Invoke(new()
        {
            Name = "AU - Sydney - Branch01",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "LOCATION",
            AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
            {
                Ids = new[]
                {
                    auSydneyBranch01.Apply(getLocationManagementResult => getLocationManagementResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.inputs.GetLocationManagementArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            final var auSydneyBranch01 = ZiaFunctions.getLocationManagement(GetLocationManagementArgs.builder()
                .name("AU - Sydney - Branch01")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("LOCATION")
                .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                    .ids(auSydneyBranch01.applyValue(getLocationManagementResult -> getLocationManagementResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: LOCATION
          adminScopeEntities:
            ids:
              - ${auSydneyBranch01.id}
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
      auSydneyBranch01:
        fn::invoke:
          Function: zia:getLocationManagement
          Arguments:
            name: AU - Sydney - Branch01
    

    Location Group Scope

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const superAdmin = zia.getAdminRoles({
        name: "Super Admin",
    });
    const corporateUserTrafficGroup = zia.getLocationGroups({
        name: "Corporate User Traffic Group",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    const johnSmith = new zia.AdminUsers("johnSmith", {
        loginName: "john.smith@acme.com",
        userName: "John Smith",
        email: "john.smith@acme.com",
        isPasswordLoginAllowed: true,
        password: "*********************",
        isSecurityReportCommEnabled: true,
        isServiceUpdateCommEnabled: true,
        isProductUpdateCommEnabled: true,
        comments: "Administrator User",
        roles: [{
            id: superAdmin.then(superAdmin => superAdmin.id),
        }],
        adminScopeType: "LOCATION_GROUP",
        adminScopeEntities: {
            ids: [corporateUserTrafficGroup.then(corporateUserTrafficGroup => corporateUserTrafficGroup.id)],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    super_admin = zia.get_admin_roles(name="Super Admin")
    corporate_user_traffic_group = zia.get_location_groups(name="Corporate User Traffic Group")
    ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    john_smith = zia.AdminUsers("johnSmith",
        login_name="john.smith@acme.com",
        user_name="John Smith",
        email="john.smith@acme.com",
        is_password_login_allowed=True,
        password="*********************",
        is_security_report_comm_enabled=True,
        is_service_update_comm_enabled=True,
        is_product_update_comm_enabled=True,
        comments="Administrator User",
        roles=[zia.AdminUsersRoleArgs(
            id=super_admin.id,
        )],
        admin_scope_type="LOCATION_GROUP",
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[corporate_user_traffic_group.id],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
    			Name: pulumi.StringRef("Super Admin"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		corporateUserTrafficGroup, err := zia.GetLocationGroups(ctx, &zia.GetLocationGroupsArgs{
    			Name: pulumi.StringRef("Corporate User Traffic Group"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
    			LoginName:                   pulumi.String("john.smith@acme.com"),
    			UserName:                    pulumi.String("John Smith"),
    			Email:                       pulumi.String("john.smith@acme.com"),
    			IsPasswordLoginAllowed:      pulumi.Bool(true),
    			Password:                    pulumi.String("*********************"),
    			IsSecurityReportCommEnabled: pulumi.Bool(true),
    			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
    			IsProductUpdateCommEnabled:  pulumi.Bool(true),
    			Comments:                    pulumi.String("Administrator User"),
    			Roles: zia.AdminUsersRoleArray{
    				&zia.AdminUsersRoleArgs{
    					Id: pulumi.Int(superAdmin.Id),
    				},
    			},
    			AdminScopeType: pulumi.String("LOCATION_GROUP"),
    			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(corporateUserTrafficGroup.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var superAdmin = Zia.GetAdminRoles.Invoke(new()
        {
            Name = "Super Admin",
        });
    
        var corporateUserTrafficGroup = Zia.GetLocationGroups.Invoke(new()
        {
            Name = "Corporate User Traffic Group",
        });
    
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new Zia.AdminUsers("johnSmith", new()
        {
            LoginName = "john.smith@acme.com",
            UserName = "John Smith",
            Email = "john.smith@acme.com",
            IsPasswordLoginAllowed = true,
            Password = "*********************",
            IsSecurityReportCommEnabled = true,
            IsServiceUpdateCommEnabled = true,
            IsProductUpdateCommEnabled = true,
            Comments = "Administrator User",
            Roles = new[]
            {
                new Zia.Inputs.AdminUsersRoleArgs
                {
                    Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
                },
            },
            AdminScopeType = "LOCATION_GROUP",
            AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
            {
                Ids = new[]
                {
                    corporateUserTrafficGroup.Apply(getLocationGroupsResult => getLocationGroupsResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetAdminRolesArgs;
    import com.pulumi.zia.inputs.GetLocationGroupsArgs;
    import com.pulumi.zia.AdminUsers;
    import com.pulumi.zia.AdminUsersArgs;
    import com.pulumi.zia.inputs.AdminUsersRoleArgs;
    import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
                .name("Super Admin")
                .build());
    
            final var corporateUserTrafficGroup = ZiaFunctions.getLocationGroups(GetLocationGroupsArgs.builder()
                .name("Corporate User Traffic Group")
                .build());
    
            //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
            var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
                .loginName("john.smith@acme.com")
                .userName("John Smith")
                .email("john.smith@acme.com")
                .isPasswordLoginAllowed(true)
                .password("*********************")
                .isSecurityReportCommEnabled(true)
                .isServiceUpdateCommEnabled(true)
                .isProductUpdateCommEnabled(true)
                .comments("Administrator User")
                .roles(AdminUsersRoleArgs.builder()
                    .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                    .build())
                .adminScopeType("LOCATION_GROUP")
                .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                    .ids(corporateUserTrafficGroup.applyValue(getLocationGroupsResult -> getLocationGroupsResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
      johnSmith:
        type: zia:AdminUsers
        properties:
          loginName: john.smith@acme.com
          userName: John Smith
          email: john.smith@acme.com
          isPasswordLoginAllowed: true
          password: '*********************'
          isSecurityReportCommEnabled: true
          isServiceUpdateCommEnabled: true
          isProductUpdateCommEnabled: true
          comments: Administrator User
          roles:
            - id: ${superAdmin.id}
          adminScopeType: LOCATION_GROUP
          adminScopeEntities:
            ids:
              - ${corporateUserTrafficGroup.id}
    variables:
      superAdmin:
        fn::invoke:
          Function: zia:getAdminRoles
          Arguments:
            name: Super Admin
      corporateUserTrafficGroup:
        fn::invoke:
          Function: zia:getLocationGroups
          Arguments:
            name: Corporate User Traffic Group
    

    Create AdminUsers Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new AdminUsers(name: string, args: AdminUsersArgs, opts?: CustomResourceOptions);
    @overload
    def AdminUsers(resource_name: str,
                   args: AdminUsersArgs,
                   opts: Optional[ResourceOptions] = None)
    
    @overload
    def AdminUsers(resource_name: str,
                   opts: Optional[ResourceOptions] = None,
                   email: Optional[str] = None,
                   username: Optional[str] = None,
                   login_name: Optional[str] = None,
                   is_password_expired: Optional[bool] = None,
                   is_product_update_comm_enabled: Optional[bool] = None,
                   is_auditor: Optional[bool] = None,
                   is_exec_mobile_app_enabled: Optional[bool] = None,
                   is_non_editable: Optional[bool] = None,
                   admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
                   is_password_login_allowed: Optional[bool] = None,
                   disabled: Optional[bool] = None,
                   is_security_report_comm_enabled: Optional[bool] = None,
                   is_service_update_comm_enabled: Optional[bool] = None,
                   comments: Optional[str] = None,
                   password: Optional[str] = None,
                   roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
                   admin_scope_type: Optional[str] = None)
    func NewAdminUsers(ctx *Context, name string, args AdminUsersArgs, opts ...ResourceOption) (*AdminUsers, error)
    public AdminUsers(string name, AdminUsersArgs args, CustomResourceOptions? opts = null)
    public AdminUsers(String name, AdminUsersArgs args)
    public AdminUsers(String name, AdminUsersArgs args, CustomResourceOptions options)
    
    type: zia:AdminUsers
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AdminUsersArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var adminUsersResource = new Zia.AdminUsers("adminUsersResource", new()
    {
        Email = "string",
        Username = "string",
        LoginName = "string",
        IsPasswordExpired = false,
        IsProductUpdateCommEnabled = false,
        IsAuditor = false,
        IsExecMobileAppEnabled = false,
        IsNonEditable = false,
        AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        IsPasswordLoginAllowed = false,
        Disabled = false,
        IsSecurityReportCommEnabled = false,
        IsServiceUpdateCommEnabled = false,
        Comments = "string",
        Password = "string",
        Roles = new[]
        {
            new Zia.Inputs.AdminUsersRoleArgs
            {
                Id = 0,
            },
        },
        AdminScopeType = "string",
    });
    
    example, err := zia.NewAdminUsers(ctx, "adminUsersResource", &zia.AdminUsersArgs{
    	Email:                      pulumi.String("string"),
    	Username:                   pulumi.String("string"),
    	LoginName:                  pulumi.String("string"),
    	IsPasswordExpired:          pulumi.Bool(false),
    	IsProductUpdateCommEnabled: pulumi.Bool(false),
    	IsAuditor:                  pulumi.Bool(false),
    	IsExecMobileAppEnabled:     pulumi.Bool(false),
    	IsNonEditable:              pulumi.Bool(false),
    	AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	IsPasswordLoginAllowed:      pulumi.Bool(false),
    	Disabled:                    pulumi.Bool(false),
    	IsSecurityReportCommEnabled: pulumi.Bool(false),
    	IsServiceUpdateCommEnabled:  pulumi.Bool(false),
    	Comments:                    pulumi.String("string"),
    	Password:                    pulumi.String("string"),
    	Roles: zia.AdminUsersRoleArray{
    		&zia.AdminUsersRoleArgs{
    			Id: pulumi.Int(0),
    		},
    	},
    	AdminScopeType: pulumi.String("string"),
    })
    
    var adminUsersResource = new AdminUsers("adminUsersResource", AdminUsersArgs.builder()        
        .email("string")
        .username("string")
        .loginName("string")
        .isPasswordExpired(false)
        .isProductUpdateCommEnabled(false)
        .isAuditor(false)
        .isExecMobileAppEnabled(false)
        .isNonEditable(false)
        .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
            .ids(0)
            .build())
        .isPasswordLoginAllowed(false)
        .disabled(false)
        .isSecurityReportCommEnabled(false)
        .isServiceUpdateCommEnabled(false)
        .comments("string")
        .password("string")
        .roles(AdminUsersRoleArgs.builder()
            .id(0)
            .build())
        .adminScopeType("string")
        .build());
    
    admin_users_resource = zia.AdminUsers("adminUsersResource",
        email="string",
        username="string",
        login_name="string",
        is_password_expired=False,
        is_product_update_comm_enabled=False,
        is_auditor=False,
        is_exec_mobile_app_enabled=False,
        is_non_editable=False,
        admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
            ids=[0],
        ),
        is_password_login_allowed=False,
        disabled=False,
        is_security_report_comm_enabled=False,
        is_service_update_comm_enabled=False,
        comments="string",
        password="string",
        roles=[zia.AdminUsersRoleArgs(
            id=0,
        )],
        admin_scope_type="string")
    
    const adminUsersResource = new zia.AdminUsers("adminUsersResource", {
        email: "string",
        username: "string",
        loginName: "string",
        isPasswordExpired: false,
        isProductUpdateCommEnabled: false,
        isAuditor: false,
        isExecMobileAppEnabled: false,
        isNonEditable: false,
        adminScopeEntities: {
            ids: [0],
        },
        isPasswordLoginAllowed: false,
        disabled: false,
        isSecurityReportCommEnabled: false,
        isServiceUpdateCommEnabled: false,
        comments: "string",
        password: "string",
        roles: [{
            id: 0,
        }],
        adminScopeType: "string",
    });
    
    type: zia:AdminUsers
    properties:
        adminScopeEntities:
            ids:
                - 0
        adminScopeType: string
        comments: string
        disabled: false
        email: string
        isAuditor: false
        isExecMobileAppEnabled: false
        isNonEditable: false
        isPasswordExpired: false
        isPasswordLoginAllowed: false
        isProductUpdateCommEnabled: false
        isSecurityReportCommEnabled: false
        isServiceUpdateCommEnabled: false
        loginName: string
        password: string
        roles:
            - id: 0
        username: string
    

    AdminUsers Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The AdminUsers resource accepts the following input properties:

    Email string
    Admin or auditor's email address.
    LoginName string
    The email address of the admin user to be exported.
    Username string
    The username of the admin user to be exported.
    AdminScopeEntities zscaler.PulumiPackage.Zia.Inputs.AdminUsersAdminScopeEntities
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    AdminScopeType string
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    Indicates whether or not the admin account is disabled.
    IsAuditor bool
    Indicates whether the user is an auditor. This attribute is subject to change.
    IsExecMobileAppEnabled bool
    Indicates whether or not Executive Insights App access is enabled for the admin.
    IsNonEditable bool
    Indicates whether or not the admin can be edited or deleted.
    IsPasswordExpired bool
    Indicates whether or not an admin's password has expired.
    IsPasswordLoginAllowed bool
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    IsProductUpdateCommEnabled bool
    Communication setting for Product Update.
    IsSecurityReportCommEnabled bool
    Communication for Security Report is enabled.
    IsServiceUpdateCommEnabled bool
    Communication setting for Service Update.
    Password string
    The username of the admin user to be exported.
    Roles List<zscaler.PulumiPackage.Zia.Inputs.AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    Email string
    Admin or auditor's email address.
    LoginName string
    The email address of the admin user to be exported.
    Username string
    The username of the admin user to be exported.
    AdminScopeEntities AdminUsersAdminScopeEntitiesArgs
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    AdminScopeType string
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    Indicates whether or not the admin account is disabled.
    IsAuditor bool
    Indicates whether the user is an auditor. This attribute is subject to change.
    IsExecMobileAppEnabled bool
    Indicates whether or not Executive Insights App access is enabled for the admin.
    IsNonEditable bool
    Indicates whether or not the admin can be edited or deleted.
    IsPasswordExpired bool
    Indicates whether or not an admin's password has expired.
    IsPasswordLoginAllowed bool
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    IsProductUpdateCommEnabled bool
    Communication setting for Product Update.
    IsSecurityReportCommEnabled bool
    Communication for Security Report is enabled.
    IsServiceUpdateCommEnabled bool
    Communication setting for Service Update.
    Password string
    The username of the admin user to be exported.
    Roles []AdminUsersRoleArgs
    Role of the admin. This is not required for an auditor.
    email String
    Admin or auditor's email address.
    loginName String
    The email address of the admin user to be exported.
    username String
    The username of the admin user to be exported.
    adminScopeEntities AdminUsersAdminScopeEntities
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    adminScopeType String
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    Indicates whether or not the admin account is disabled.
    isAuditor Boolean
    Indicates whether the user is an auditor. This attribute is subject to change.
    isExecMobileAppEnabled Boolean
    Indicates whether or not Executive Insights App access is enabled for the admin.
    isNonEditable Boolean
    Indicates whether or not the admin can be edited or deleted.
    isPasswordExpired Boolean
    Indicates whether or not an admin's password has expired.
    isPasswordLoginAllowed Boolean
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    isProductUpdateCommEnabled Boolean
    Communication setting for Product Update.
    isSecurityReportCommEnabled Boolean
    Communication for Security Report is enabled.
    isServiceUpdateCommEnabled Boolean
    Communication setting for Service Update.
    password String
    The username of the admin user to be exported.
    roles List<AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    email string
    Admin or auditor's email address.
    loginName string
    The email address of the admin user to be exported.
    username string
    The username of the admin user to be exported.
    adminScopeEntities AdminUsersAdminScopeEntities
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    adminScopeType string
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments string
    Additional information about the admin or auditor.
    disabled boolean
    Indicates whether or not the admin account is disabled.
    isAuditor boolean
    Indicates whether the user is an auditor. This attribute is subject to change.
    isExecMobileAppEnabled boolean
    Indicates whether or not Executive Insights App access is enabled for the admin.
    isNonEditable boolean
    Indicates whether or not the admin can be edited or deleted.
    isPasswordExpired boolean
    Indicates whether or not an admin's password has expired.
    isPasswordLoginAllowed boolean
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    isProductUpdateCommEnabled boolean
    Communication setting for Product Update.
    isSecurityReportCommEnabled boolean
    Communication for Security Report is enabled.
    isServiceUpdateCommEnabled boolean
    Communication setting for Service Update.
    password string
    The username of the admin user to be exported.
    roles AdminUsersRole[]
    Role of the admin. This is not required for an auditor.
    email str
    Admin or auditor's email address.
    login_name str
    The email address of the admin user to be exported.
    username str
    The username of the admin user to be exported.
    admin_scope_entities AdminUsersAdminScopeEntitiesArgs
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    admin_scope_type str
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments str
    Additional information about the admin or auditor.
    disabled bool
    Indicates whether or not the admin account is disabled.
    is_auditor bool
    Indicates whether the user is an auditor. This attribute is subject to change.
    is_exec_mobile_app_enabled bool
    Indicates whether or not Executive Insights App access is enabled for the admin.
    is_non_editable bool
    Indicates whether or not the admin can be edited or deleted.
    is_password_expired bool
    Indicates whether or not an admin's password has expired.
    is_password_login_allowed bool
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    is_product_update_comm_enabled bool
    Communication setting for Product Update.
    is_security_report_comm_enabled bool
    Communication for Security Report is enabled.
    is_service_update_comm_enabled bool
    Communication setting for Service Update.
    password str
    The username of the admin user to be exported.
    roles Sequence[AdminUsersRoleArgs]
    Role of the admin. This is not required for an auditor.
    email String
    Admin or auditor's email address.
    loginName String
    The email address of the admin user to be exported.
    username String
    The username of the admin user to be exported.
    adminScopeEntities Property Map
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    adminScopeType String
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    Indicates whether or not the admin account is disabled.
    isAuditor Boolean
    Indicates whether the user is an auditor. This attribute is subject to change.
    isExecMobileAppEnabled Boolean
    Indicates whether or not Executive Insights App access is enabled for the admin.
    isNonEditable Boolean
    Indicates whether or not the admin can be edited or deleted.
    isPasswordExpired Boolean
    Indicates whether or not an admin's password has expired.
    isPasswordLoginAllowed Boolean
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    isProductUpdateCommEnabled Boolean
    Communication setting for Product Update.
    isSecurityReportCommEnabled Boolean
    Communication for Security Report is enabled.
    isServiceUpdateCommEnabled Boolean
    Communication setting for Service Update.
    password String
    The username of the admin user to be exported.
    roles List<Property Map>
    Role of the admin. This is not required for an auditor.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AdminUsers resource produces the following output properties:

    AdminId int
    Id string
    The provider-assigned unique ID for this managed resource.
    AdminId int
    Id string
    The provider-assigned unique ID for this managed resource.
    adminId Integer
    id String
    The provider-assigned unique ID for this managed resource.
    adminId number
    id string
    The provider-assigned unique ID for this managed resource.
    admin_id int
    id str
    The provider-assigned unique ID for this managed resource.
    adminId Number
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing AdminUsers Resource

    Get an existing AdminUsers resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AdminUsersState, opts?: CustomResourceOptions): AdminUsers
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            admin_id: Optional[int] = None,
            admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
            admin_scope_type: Optional[str] = None,
            comments: Optional[str] = None,
            disabled: Optional[bool] = None,
            email: Optional[str] = None,
            is_auditor: Optional[bool] = None,
            is_exec_mobile_app_enabled: Optional[bool] = None,
            is_non_editable: Optional[bool] = None,
            is_password_expired: Optional[bool] = None,
            is_password_login_allowed: Optional[bool] = None,
            is_product_update_comm_enabled: Optional[bool] = None,
            is_security_report_comm_enabled: Optional[bool] = None,
            is_service_update_comm_enabled: Optional[bool] = None,
            login_name: Optional[str] = None,
            password: Optional[str] = None,
            roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
            username: Optional[str] = None) -> AdminUsers
    func GetAdminUsers(ctx *Context, name string, id IDInput, state *AdminUsersState, opts ...ResourceOption) (*AdminUsers, error)
    public static AdminUsers Get(string name, Input<string> id, AdminUsersState? state, CustomResourceOptions? opts = null)
    public static AdminUsers get(String name, Output<String> id, AdminUsersState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AdminId int
    AdminScopeEntities zscaler.PulumiPackage.Zia.Inputs.AdminUsersAdminScopeEntities
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    AdminScopeType string
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    Indicates whether or not the admin account is disabled.
    Email string
    Admin or auditor's email address.
    IsAuditor bool
    Indicates whether the user is an auditor. This attribute is subject to change.
    IsExecMobileAppEnabled bool
    Indicates whether or not Executive Insights App access is enabled for the admin.
    IsNonEditable bool
    Indicates whether or not the admin can be edited or deleted.
    IsPasswordExpired bool
    Indicates whether or not an admin's password has expired.
    IsPasswordLoginAllowed bool
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    IsProductUpdateCommEnabled bool
    Communication setting for Product Update.
    IsSecurityReportCommEnabled bool
    Communication for Security Report is enabled.
    IsServiceUpdateCommEnabled bool
    Communication setting for Service Update.
    LoginName string
    The email address of the admin user to be exported.
    Password string
    The username of the admin user to be exported.
    Roles List<zscaler.PulumiPackage.Zia.Inputs.AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    Username string
    The username of the admin user to be exported.
    AdminId int
    AdminScopeEntities AdminUsersAdminScopeEntitiesArgs
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    AdminScopeType string
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    Comments string
    Additional information about the admin or auditor.
    Disabled bool
    Indicates whether or not the admin account is disabled.
    Email string
    Admin or auditor's email address.
    IsAuditor bool
    Indicates whether the user is an auditor. This attribute is subject to change.
    IsExecMobileAppEnabled bool
    Indicates whether or not Executive Insights App access is enabled for the admin.
    IsNonEditable bool
    Indicates whether or not the admin can be edited or deleted.
    IsPasswordExpired bool
    Indicates whether or not an admin's password has expired.
    IsPasswordLoginAllowed bool
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    IsProductUpdateCommEnabled bool
    Communication setting for Product Update.
    IsSecurityReportCommEnabled bool
    Communication for Security Report is enabled.
    IsServiceUpdateCommEnabled bool
    Communication setting for Service Update.
    LoginName string
    The email address of the admin user to be exported.
    Password string
    The username of the admin user to be exported.
    Roles []AdminUsersRoleArgs
    Role of the admin. This is not required for an auditor.
    Username string
    The username of the admin user to be exported.
    adminId Integer
    adminScopeEntities AdminUsersAdminScopeEntities
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    adminScopeType String
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    Indicates whether or not the admin account is disabled.
    email String
    Admin or auditor's email address.
    isAuditor Boolean
    Indicates whether the user is an auditor. This attribute is subject to change.
    isExecMobileAppEnabled Boolean
    Indicates whether or not Executive Insights App access is enabled for the admin.
    isNonEditable Boolean
    Indicates whether or not the admin can be edited or deleted.
    isPasswordExpired Boolean
    Indicates whether or not an admin's password has expired.
    isPasswordLoginAllowed Boolean
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    isProductUpdateCommEnabled Boolean
    Communication setting for Product Update.
    isSecurityReportCommEnabled Boolean
    Communication for Security Report is enabled.
    isServiceUpdateCommEnabled Boolean
    Communication setting for Service Update.
    loginName String
    The email address of the admin user to be exported.
    password String
    The username of the admin user to be exported.
    roles List<AdminUsersRole>
    Role of the admin. This is not required for an auditor.
    username String
    The username of the admin user to be exported.
    adminId number
    adminScopeEntities AdminUsersAdminScopeEntities
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    adminScopeType string
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments string
    Additional information about the admin or auditor.
    disabled boolean
    Indicates whether or not the admin account is disabled.
    email string
    Admin or auditor's email address.
    isAuditor boolean
    Indicates whether the user is an auditor. This attribute is subject to change.
    isExecMobileAppEnabled boolean
    Indicates whether or not Executive Insights App access is enabled for the admin.
    isNonEditable boolean
    Indicates whether or not the admin can be edited or deleted.
    isPasswordExpired boolean
    Indicates whether or not an admin's password has expired.
    isPasswordLoginAllowed boolean
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    isProductUpdateCommEnabled boolean
    Communication setting for Product Update.
    isSecurityReportCommEnabled boolean
    Communication for Security Report is enabled.
    isServiceUpdateCommEnabled boolean
    Communication setting for Service Update.
    loginName string
    The email address of the admin user to be exported.
    password string
    The username of the admin user to be exported.
    roles AdminUsersRole[]
    Role of the admin. This is not required for an auditor.
    username string
    The username of the admin user to be exported.
    admin_id int
    admin_scope_entities AdminUsersAdminScopeEntitiesArgs
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    admin_scope_type str
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments str
    Additional information about the admin or auditor.
    disabled bool
    Indicates whether or not the admin account is disabled.
    email str
    Admin or auditor's email address.
    is_auditor bool
    Indicates whether the user is an auditor. This attribute is subject to change.
    is_exec_mobile_app_enabled bool
    Indicates whether or not Executive Insights App access is enabled for the admin.
    is_non_editable bool
    Indicates whether or not the admin can be edited or deleted.
    is_password_expired bool
    Indicates whether or not an admin's password has expired.
    is_password_login_allowed bool
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    is_product_update_comm_enabled bool
    Communication setting for Product Update.
    is_security_report_comm_enabled bool
    Communication for Security Report is enabled.
    is_service_update_comm_enabled bool
    Communication setting for Service Update.
    login_name str
    The email address of the admin user to be exported.
    password str
    The username of the admin user to be exported.
    roles Sequence[AdminUsersRoleArgs]
    Role of the admin. This is not required for an auditor.
    username str
    The username of the admin user to be exported.
    adminId Number
    adminScopeEntities Property Map
    Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
    adminScopeType String
    The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION, DEPARTMENT, LOCATION, LOCATION_GROUP
    comments String
    Additional information about the admin or auditor.
    disabled Boolean
    Indicates whether or not the admin account is disabled.
    email String
    Admin or auditor's email address.
    isAuditor Boolean
    Indicates whether the user is an auditor. This attribute is subject to change.
    isExecMobileAppEnabled Boolean
    Indicates whether or not Executive Insights App access is enabled for the admin.
    isNonEditable Boolean
    Indicates whether or not the admin can be edited or deleted.
    isPasswordExpired Boolean
    Indicates whether or not an admin's password has expired.
    isPasswordLoginAllowed Boolean
    The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
    isProductUpdateCommEnabled Boolean
    Communication setting for Product Update.
    isSecurityReportCommEnabled Boolean
    Communication for Security Report is enabled.
    isServiceUpdateCommEnabled Boolean
    Communication setting for Service Update.
    loginName String
    The email address of the admin user to be exported.
    password String
    The username of the admin user to be exported.
    roles List<Property Map>
    Role of the admin. This is not required for an auditor.
    username String
    The username of the admin user to be exported.

    Supporting Types

    AdminUsersAdminScopeEntities, AdminUsersAdminScopeEntitiesArgs

    Ids List<int>
    Identifier that uniquely identifies an entity
    Ids []int
    Identifier that uniquely identifies an entity
    ids List<Integer>
    Identifier that uniquely identifies an entity
    ids number[]
    Identifier that uniquely identifies an entity
    ids Sequence[int]
    Identifier that uniquely identifies an entity
    ids List<Number>
    Identifier that uniquely identifies an entity

    AdminUsersRole, AdminUsersRoleArgs

    Id int
    Identifier that uniquely identifies an entity
    Id int
    Identifier that uniquely identifies an entity
    id Integer
    Identifier that uniquely identifies an entity
    id number
    Identifier that uniquely identifies an entity
    id int
    Identifier that uniquely identifies an entity
    id Number
    Identifier that uniquely identifies an entity

    Import

    Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.

    Visit

    zia_admin_users can be imported by using <ADMIN ID> or <LOGIN NAME> as the import ID.

    For example:

    $ pulumi import zia:index/adminUsers:AdminUsers example <admin_id>
    

    or

    $ pulumi import zia:index/adminUsers:AdminUsers example <login_name>
    

    ⚠️ NOTE :: This provider do not import the password attribute value during the importing process.

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    zia zscaler/pulumi-zia
    License
    MIT
    Notes
    This Pulumi package is based on the zia Terraform Provider.
    zia logo
    Zscaler Internet Access v0.0.6 published on Wednesday, Apr 10, 2024 by Zscaler