zia.SSLInspectionRules
Explore with Pulumi AI
Example Usage
Action - DECRYPT
data "zia_group_management" "this" {
name = "A000"
}
resource "zia_ssl_inspection_rules" "this" {
name = "SSL_Inspection_Rule_Decrypt"
description = "SSL_Inspection_Rule_Decrypt"
state = "ENABLED"
order = 1
rank = 7
road_warrior_for_kerberos = true
cloud_applications = ["CHATGPT_AI", "ANDI"]
platforms = ["SCAN_IOS", "SCAN_ANDROID", "SCAN_MACOS", "SCAN_WINDOWS", "NO_CLIENT_CONNECTOR", "SCAN_LINUX"]
action {
type = "DECRYPT"
# show_eun = false
# show_eunatp = false
override_default_certificate = false
ssl_interception_cert {
id = 1
name = "Zscaler Intermediate CA Certificate"
default_certificate = true
}
decrypt_sub_actions {
server_certificates = "ALLOW"
ocsp_check = true
block_ssl_traffic_with_no_sni_enabled = true
min_client_tls_version = "CLIENT_TLS_1_0"
min_server_tls_version = "SERVER_TLS_1_0"
block_undecrypt = true
http2_enabled = false
}
}
groups {
id = [ data.zia_group_management.this.id ]
}
}
Action - DO_NOT_DECRYPT - Bypass Rule (False)
data "zia_group_management" "this" {
name = "A000"
}
resource "zia_ssl_inspection_rules" "this" {
name = "SSL_Rule_Do_Not_Decrypt"
description = "SSL_Rule_Do_Not_Decrypt"
state = "ENABLED"
order = 1
rank = 7
road_warrior_for_kerberos = true
cloud_applications = ["CHATGPT_AI", "ANDI"]
platforms = ["SCAN_IOS", "SCAN_ANDROID", "SCAN_MACOS", "SCAN_WINDOWS", "NO_CLIENT_CONNECTOR", "SCAN_LINUX"]
action {
type = "DO_NOT_DECRYPT"
do_not_decrypt_sub_actions {
bypass_other_policies = false
server_certificates = "ALLOW"
ocsp_check = true
block_ssl_traffic_with_no_sni_enabled = true
min_tls_version = "SERVER_TLS_1_0"
}
}
groups {
id = [ data.zia_group_management.this.id ]
}
}
Action - DO_NOT_DECRYPT - Bypass Rule (True)
data "zia_group_management" "this" {
name = "A000"
}
resource "zia_ssl_inspection_rules" "this" {
name = "SSL_Rule_Bypass_Rule"
description = "SSL_Rule_Bypass_Rule"
state = "ENABLED"
order = 1
rank = 7
road_warrior_for_kerberos = true
cloud_applications = ["CHATGPT_AI", "ANDI"]
platforms = ["SCAN_IOS", "SCAN_ANDROID", "SCAN_MACOS", "SCAN_WINDOWS", "NO_CLIENT_CONNECTOR", "SCAN_LINUX"]
action {
type = "DO_NOT_DECRYPT"
do_not_decrypt_sub_actions {
bypass_other_policies = true
block_ssl_traffic_with_no_sni_enabled = true
}
}
groups {
id = [ data.zia_group_management.this.id ]
}
}
Action - BLOCK
data "zia_group_management" "this" {
name = "A000"
}
resource "zia_ssl_inspection_rules" "this" {
name = "SSL_Rule_BLOCK"
description = "SSL_Rule_BLOCK"
state = "ENABLED"
order = 1
rank = 7
road_warrior_for_kerberos = true
cloud_applications = ["CHATGPT_AI", "ANDI"]
platforms = ["SCAN_IOS", "SCAN_ANDROID", "SCAN_MACOS", "SCAN_WINDOWS", "NO_CLIENT_CONNECTOR", "SCAN_LINUX"]
action {
type = "BLOCK"
ssl_interception_cert {
id = 1
}
}
groups {
id = [ data.zia_group_management.this.id ]
}
}
Create SSLInspectionRules Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SSLInspectionRules(name: string, args: SSLInspectionRulesArgs, opts?: CustomResourceOptions);
@overload
def SSLInspectionRules(resource_name: str,
args: SSLInspectionRulesArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SSLInspectionRules(resource_name: str,
opts: Optional[ResourceOptions] = None,
order: Optional[int] = None,
name: Optional[str] = None,
user_agent_types: Optional[Sequence[str]] = None,
description: Optional[str] = None,
dest_ip_groups: Optional[SSLInspectionRulesDestIpGroupsArgs] = None,
device_groups: Optional[SSLInspectionRulesDeviceGroupsArgs] = None,
device_trust_levels: Optional[Sequence[str]] = None,
devices: Optional[SSLInspectionRulesDevicesArgs] = None,
groups: Optional[SSLInspectionRulesGroupsArgs] = None,
labels: Optional[SSLInspectionRulesLabelsArgs] = None,
location_groups: Optional[SSLInspectionRulesLocationGroupsArgs] = None,
locations: Optional[SSLInspectionRulesLocationsArgs] = None,
actions: Optional[Sequence[SSLInspectionRulesActionArgs]] = None,
departments: Optional[SSLInspectionRulesDepartmentsArgs] = None,
proxy_gateways: Optional[SSLInspectionRulesProxyGatewaysArgs] = None,
cloud_applications: Optional[Sequence[str]] = None,
rank: Optional[int] = None,
road_warrior_for_kerberos: Optional[bool] = None,
source_ip_groups: Optional[SSLInspectionRulesSourceIpGroupsArgs] = None,
state: Optional[str] = None,
time_windows: Optional[SSLInspectionRulesTimeWindowsArgs] = None,
url_categories: Optional[Sequence[str]] = None,
platforms: Optional[Sequence[str]] = None,
users: Optional[SSLInspectionRulesUsersArgs] = None,
workload_groups: Optional[Sequence[SSLInspectionRulesWorkloadGroupArgs]] = None,
zpa_app_segments: Optional[Sequence[SSLInspectionRulesZpaAppSegmentArgs]] = None)
func NewSSLInspectionRules(ctx *Context, name string, args SSLInspectionRulesArgs, opts ...ResourceOption) (*SSLInspectionRules, error)
public SSLInspectionRules(string name, SSLInspectionRulesArgs args, CustomResourceOptions? opts = null)
public SSLInspectionRules(String name, SSLInspectionRulesArgs args)
public SSLInspectionRules(String name, SSLInspectionRulesArgs args, CustomResourceOptions options)
type: zia:SSLInspectionRules
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SSLInspectionRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SSLInspectionRulesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SSLInspectionRulesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SSLInspectionRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SSLInspectionRulesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var sslinspectionRulesResource = new Zia.SSLInspectionRules("sslinspectionRulesResource", new()
{
Order = 0,
Name = "string",
UserAgentTypes = new[]
{
"string",
},
Description = "string",
DestIpGroups = new Zia.Inputs.SSLInspectionRulesDestIpGroupsArgs
{
Ids = new[]
{
0,
},
},
DeviceGroups = new Zia.Inputs.SSLInspectionRulesDeviceGroupsArgs
{
Ids = new[]
{
0,
},
},
DeviceTrustLevels = new[]
{
"string",
},
Devices = new Zia.Inputs.SSLInspectionRulesDevicesArgs
{
Ids = new[]
{
0,
},
},
Groups = new Zia.Inputs.SSLInspectionRulesGroupsArgs
{
Ids = new[]
{
0,
},
},
Labels = new Zia.Inputs.SSLInspectionRulesLabelsArgs
{
Id = 0,
},
LocationGroups = new Zia.Inputs.SSLInspectionRulesLocationGroupsArgs
{
Ids = new[]
{
0,
},
},
Locations = new Zia.Inputs.SSLInspectionRulesLocationsArgs
{
Ids = new[]
{
0,
},
},
Actions = new[]
{
new Zia.Inputs.SSLInspectionRulesActionArgs
{
DecryptSubActions = new[]
{
new Zia.Inputs.SSLInspectionRulesActionDecryptSubActionArgs
{
BlockSslTrafficWithNoSniEnabled = false,
BlockUndecrypt = false,
Http2Enabled = false,
MinClientTlsVersion = "string",
MinServerTlsVersion = "string",
OcspCheck = false,
ServerCertificates = "string",
},
},
DoNotDecryptSubActions = new[]
{
new Zia.Inputs.SSLInspectionRulesActionDoNotDecryptSubActionArgs
{
BlockSslTrafficWithNoSniEnabled = false,
BypassOtherPolicies = false,
MinTlsVersion = "string",
OcspCheck = false,
ServerCertificates = "string",
},
},
OverrideDefaultCertificate = false,
ShowEun = false,
ShowEunatp = false,
SslInterceptionCerts = new[]
{
new Zia.Inputs.SSLInspectionRulesActionSslInterceptionCertArgs
{
Id = 0,
},
},
Type = "string",
},
},
Departments = new Zia.Inputs.SSLInspectionRulesDepartmentsArgs
{
Ids = new[]
{
0,
},
},
ProxyGateways = new Zia.Inputs.SSLInspectionRulesProxyGatewaysArgs
{
Ids = new[]
{
0,
},
},
CloudApplications = new[]
{
"string",
},
Rank = 0,
RoadWarriorForKerberos = false,
SourceIpGroups = new Zia.Inputs.SSLInspectionRulesSourceIpGroupsArgs
{
Ids = new[]
{
0,
},
},
State = "string",
TimeWindows = new Zia.Inputs.SSLInspectionRulesTimeWindowsArgs
{
Ids = new[]
{
0,
},
},
UrlCategories = new[]
{
"string",
},
Platforms = new[]
{
"string",
},
Users = new Zia.Inputs.SSLInspectionRulesUsersArgs
{
Ids = new[]
{
0,
},
},
WorkloadGroups = new[]
{
new Zia.Inputs.SSLInspectionRulesWorkloadGroupArgs
{
Id = 0,
Name = "string",
},
},
ZpaAppSegments = new[]
{
new Zia.Inputs.SSLInspectionRulesZpaAppSegmentArgs
{
ExternalId = "string",
Name = "string",
},
},
});
example, err := zia.NewSSLInspectionRules(ctx, "sslinspectionRulesResource", &zia.SSLInspectionRulesArgs{
Order: pulumi.Int(0),
Name: pulumi.String("string"),
UserAgentTypes: pulumi.StringArray{
pulumi.String("string"),
},
Description: pulumi.String("string"),
DestIpGroups: &zia.SSLInspectionRulesDestIpGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
DeviceGroups: &zia.SSLInspectionRulesDeviceGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
DeviceTrustLevels: pulumi.StringArray{
pulumi.String("string"),
},
Devices: &zia.SSLInspectionRulesDevicesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Groups: &zia.SSLInspectionRulesGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Labels: &zia.SSLInspectionRulesLabelsArgs{
Id: pulumi.Int(0),
},
LocationGroups: &zia.SSLInspectionRulesLocationGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Locations: &zia.SSLInspectionRulesLocationsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Actions: zia.SSLInspectionRulesActionArray{
&zia.SSLInspectionRulesActionArgs{
DecryptSubActions: zia.SSLInspectionRulesActionDecryptSubActionArray{
&zia.SSLInspectionRulesActionDecryptSubActionArgs{
BlockSslTrafficWithNoSniEnabled: pulumi.Bool(false),
BlockUndecrypt: pulumi.Bool(false),
Http2Enabled: pulumi.Bool(false),
MinClientTlsVersion: pulumi.String("string"),
MinServerTlsVersion: pulumi.String("string"),
OcspCheck: pulumi.Bool(false),
ServerCertificates: pulumi.String("string"),
},
},
DoNotDecryptSubActions: zia.SSLInspectionRulesActionDoNotDecryptSubActionArray{
&zia.SSLInspectionRulesActionDoNotDecryptSubActionArgs{
BlockSslTrafficWithNoSniEnabled: pulumi.Bool(false),
BypassOtherPolicies: pulumi.Bool(false),
MinTlsVersion: pulumi.String("string"),
OcspCheck: pulumi.Bool(false),
ServerCertificates: pulumi.String("string"),
},
},
OverrideDefaultCertificate: pulumi.Bool(false),
ShowEun: pulumi.Bool(false),
ShowEunatp: pulumi.Bool(false),
SslInterceptionCerts: zia.SSLInspectionRulesActionSslInterceptionCertArray{
&zia.SSLInspectionRulesActionSslInterceptionCertArgs{
Id: pulumi.Int(0),
},
},
Type: pulumi.String("string"),
},
},
Departments: &zia.SSLInspectionRulesDepartmentsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ProxyGateways: &zia.SSLInspectionRulesProxyGatewaysArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
CloudApplications: pulumi.StringArray{
pulumi.String("string"),
},
Rank: pulumi.Int(0),
RoadWarriorForKerberos: pulumi.Bool(false),
SourceIpGroups: &zia.SSLInspectionRulesSourceIpGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
State: pulumi.String("string"),
TimeWindows: &zia.SSLInspectionRulesTimeWindowsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
UrlCategories: pulumi.StringArray{
pulumi.String("string"),
},
Platforms: pulumi.StringArray{
pulumi.String("string"),
},
Users: &zia.SSLInspectionRulesUsersArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
WorkloadGroups: zia.SSLInspectionRulesWorkloadGroupArray{
&zia.SSLInspectionRulesWorkloadGroupArgs{
Id: pulumi.Int(0),
Name: pulumi.String("string"),
},
},
ZpaAppSegments: zia.SSLInspectionRulesZpaAppSegmentArray{
&zia.SSLInspectionRulesZpaAppSegmentArgs{
ExternalId: pulumi.String("string"),
Name: pulumi.String("string"),
},
},
})
var sslinspectionRulesResource = new SSLInspectionRules("sslinspectionRulesResource", SSLInspectionRulesArgs.builder()
.order(0)
.name("string")
.userAgentTypes("string")
.description("string")
.destIpGroups(SSLInspectionRulesDestIpGroupsArgs.builder()
.ids(0)
.build())
.deviceGroups(SSLInspectionRulesDeviceGroupsArgs.builder()
.ids(0)
.build())
.deviceTrustLevels("string")
.devices(SSLInspectionRulesDevicesArgs.builder()
.ids(0)
.build())
.groups(SSLInspectionRulesGroupsArgs.builder()
.ids(0)
.build())
.labels(SSLInspectionRulesLabelsArgs.builder()
.id(0)
.build())
.locationGroups(SSLInspectionRulesLocationGroupsArgs.builder()
.ids(0)
.build())
.locations(SSLInspectionRulesLocationsArgs.builder()
.ids(0)
.build())
.actions(SSLInspectionRulesActionArgs.builder()
.decryptSubActions(SSLInspectionRulesActionDecryptSubActionArgs.builder()
.blockSslTrafficWithNoSniEnabled(false)
.blockUndecrypt(false)
.http2Enabled(false)
.minClientTlsVersion("string")
.minServerTlsVersion("string")
.ocspCheck(false)
.serverCertificates("string")
.build())
.doNotDecryptSubActions(SSLInspectionRulesActionDoNotDecryptSubActionArgs.builder()
.blockSslTrafficWithNoSniEnabled(false)
.bypassOtherPolicies(false)
.minTlsVersion("string")
.ocspCheck(false)
.serverCertificates("string")
.build())
.overrideDefaultCertificate(false)
.showEun(false)
.showEunatp(false)
.sslInterceptionCerts(SSLInspectionRulesActionSslInterceptionCertArgs.builder()
.id(0)
.build())
.type("string")
.build())
.departments(SSLInspectionRulesDepartmentsArgs.builder()
.ids(0)
.build())
.proxyGateways(SSLInspectionRulesProxyGatewaysArgs.builder()
.ids(0)
.build())
.cloudApplications("string")
.rank(0)
.roadWarriorForKerberos(false)
.sourceIpGroups(SSLInspectionRulesSourceIpGroupsArgs.builder()
.ids(0)
.build())
.state("string")
.timeWindows(SSLInspectionRulesTimeWindowsArgs.builder()
.ids(0)
.build())
.urlCategories("string")
.platforms("string")
.users(SSLInspectionRulesUsersArgs.builder()
.ids(0)
.build())
.workloadGroups(SSLInspectionRulesWorkloadGroupArgs.builder()
.id(0)
.name("string")
.build())
.zpaAppSegments(SSLInspectionRulesZpaAppSegmentArgs.builder()
.externalId("string")
.name("string")
.build())
.build());
sslinspection_rules_resource = zia.SSLInspectionRules("sslinspectionRulesResource",
order=0,
name="string",
user_agent_types=["string"],
description="string",
dest_ip_groups={
"ids": [0],
},
device_groups={
"ids": [0],
},
device_trust_levels=["string"],
devices={
"ids": [0],
},
groups={
"ids": [0],
},
labels={
"id": 0,
},
location_groups={
"ids": [0],
},
locations={
"ids": [0],
},
actions=[{
"decrypt_sub_actions": [{
"block_ssl_traffic_with_no_sni_enabled": False,
"block_undecrypt": False,
"http2_enabled": False,
"min_client_tls_version": "string",
"min_server_tls_version": "string",
"ocsp_check": False,
"server_certificates": "string",
}],
"do_not_decrypt_sub_actions": [{
"block_ssl_traffic_with_no_sni_enabled": False,
"bypass_other_policies": False,
"min_tls_version": "string",
"ocsp_check": False,
"server_certificates": "string",
}],
"override_default_certificate": False,
"show_eun": False,
"show_eunatp": False,
"ssl_interception_certs": [{
"id": 0,
}],
"type": "string",
}],
departments={
"ids": [0],
},
proxy_gateways={
"ids": [0],
},
cloud_applications=["string"],
rank=0,
road_warrior_for_kerberos=False,
source_ip_groups={
"ids": [0],
},
state="string",
time_windows={
"ids": [0],
},
url_categories=["string"],
platforms=["string"],
users={
"ids": [0],
},
workload_groups=[{
"id": 0,
"name": "string",
}],
zpa_app_segments=[{
"external_id": "string",
"name": "string",
}])
const sslinspectionRulesResource = new zia.SSLInspectionRules("sslinspectionRulesResource", {
order: 0,
name: "string",
userAgentTypes: ["string"],
description: "string",
destIpGroups: {
ids: [0],
},
deviceGroups: {
ids: [0],
},
deviceTrustLevels: ["string"],
devices: {
ids: [0],
},
groups: {
ids: [0],
},
labels: {
id: 0,
},
locationGroups: {
ids: [0],
},
locations: {
ids: [0],
},
actions: [{
decryptSubActions: [{
blockSslTrafficWithNoSniEnabled: false,
blockUndecrypt: false,
http2Enabled: false,
minClientTlsVersion: "string",
minServerTlsVersion: "string",
ocspCheck: false,
serverCertificates: "string",
}],
doNotDecryptSubActions: [{
blockSslTrafficWithNoSniEnabled: false,
bypassOtherPolicies: false,
minTlsVersion: "string",
ocspCheck: false,
serverCertificates: "string",
}],
overrideDefaultCertificate: false,
showEun: false,
showEunatp: false,
sslInterceptionCerts: [{
id: 0,
}],
type: "string",
}],
departments: {
ids: [0],
},
proxyGateways: {
ids: [0],
},
cloudApplications: ["string"],
rank: 0,
roadWarriorForKerberos: false,
sourceIpGroups: {
ids: [0],
},
state: "string",
timeWindows: {
ids: [0],
},
urlCategories: ["string"],
platforms: ["string"],
users: {
ids: [0],
},
workloadGroups: [{
id: 0,
name: "string",
}],
zpaAppSegments: [{
externalId: "string",
name: "string",
}],
});
type: zia:SSLInspectionRules
properties:
actions:
- decryptSubActions:
- blockSslTrafficWithNoSniEnabled: false
blockUndecrypt: false
http2Enabled: false
minClientTlsVersion: string
minServerTlsVersion: string
ocspCheck: false
serverCertificates: string
doNotDecryptSubActions:
- blockSslTrafficWithNoSniEnabled: false
bypassOtherPolicies: false
minTlsVersion: string
ocspCheck: false
serverCertificates: string
overrideDefaultCertificate: false
showEun: false
showEunatp: false
sslInterceptionCerts:
- id: 0
type: string
cloudApplications:
- string
departments:
ids:
- 0
description: string
destIpGroups:
ids:
- 0
deviceGroups:
ids:
- 0
deviceTrustLevels:
- string
devices:
ids:
- 0
groups:
ids:
- 0
labels:
id: 0
locationGroups:
ids:
- 0
locations:
ids:
- 0
name: string
order: 0
platforms:
- string
proxyGateways:
ids:
- 0
rank: 0
roadWarriorForKerberos: false
sourceIpGroups:
ids:
- 0
state: string
timeWindows:
ids:
- 0
urlCategories:
- string
userAgentTypes:
- string
users:
ids:
- 0
workloadGroups:
- id: 0
name: string
zpaAppSegments:
- externalId: string
name: string
SSLInspectionRules Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SSLInspectionRules resource accepts the following input properties:
- Order int
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Actions
List<zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Action> - (Block List) - Action taken when the traffic matches policy
- Cloud
Applications List<string> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- Departments
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Departments - (Block List) - ID pairs of departments for which the rule is applied.
- Description string
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Ip zscaler.Groups Pulumi Package. Zia. Inputs. SSLInspection Rules Dest Ip Groups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- Device
Groups zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Device Groups - (Block List) - ID pairs of device groups for which the rule is applied.
- Device
Trust List<string>Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- Devices
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Devices - (Block List) - ID pairs of devices for which the rule is applied
- Groups
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Groups - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- Labels
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Labels - (Block List) - ID pairs of labels associated with the rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Location Groups - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- Locations
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Locations - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- Name string
- The name of the SSL Inspection rule
- Platforms List<string>
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- Proxy
Gateways zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Proxy Gateways - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- Rank int
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- Road
Warrior boolFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- Source
Ip zscaler.Groups Pulumi Package. Zia. Inputs. SSLInspection Rules Source Ip Groups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- State string
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Time Windows - (Block List) - The time intervals during which the rule applies
- Url
Categories List<string> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- User
Agent List<string>Types - (Set of String) - A list of user agent types the rule applies to.
- Users
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Users - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Workload
Groups List<zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Workload Group> - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Zpa
App List<zscaler.Segments Pulumi Package. Zia. Inputs. SSLInspection Rules Zpa App Segment> - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- Order int
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Actions
[]SSLInspection
Rules Action Args - (Block List) - Action taken when the traffic matches policy
- Cloud
Applications []string - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- Departments
SSLInspection
Rules Departments Args - (Block List) - ID pairs of departments for which the rule is applied.
- Description string
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Ip SSLInspectionGroups Rules Dest Ip Groups Args - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- Device
Groups SSLInspectionRules Device Groups Args - (Block List) - ID pairs of device groups for which the rule is applied.
- Device
Trust []stringLevels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- Devices
SSLInspection
Rules Devices Args - (Block List) - ID pairs of devices for which the rule is applied
- Groups
SSLInspection
Rules Groups Args - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- Labels
SSLInspection
Rules Labels Args - (Block List) - ID pairs of labels associated with the rule.
- Location
Groups SSLInspectionRules Location Groups Args - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- Locations
SSLInspection
Rules Locations Args - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- Name string
- The name of the SSL Inspection rule
- Platforms []string
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- Proxy
Gateways SSLInspectionRules Proxy Gateways Args - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- Rank int
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- Road
Warrior boolFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- Source
Ip SSLInspectionGroups Rules Source Ip Groups Args - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- State string
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- Time
Windows SSLInspectionRules Time Windows Args - (Block List) - The time intervals during which the rule applies
- Url
Categories []string - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- User
Agent []stringTypes - (Set of String) - A list of user agent types the rule applies to.
- Users
SSLInspection
Rules Users Args - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Workload
Groups []SSLInspectionRules Workload Group Args - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Zpa
App []SSLInspectionSegments Rules Zpa App Segment Args - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- order Integer
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- actions
List<SSLInspection
Rules Action> - (Block List) - Action taken when the traffic matches policy
- cloud
Applications List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments
SSLInspection
Rules Departments - (Block List) - ID pairs of departments for which the rule is applied.
- description String
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Ip SSLInspectionGroups Rules Dest Ip Groups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device
Groups SSLInspectionRules Device Groups - (Block List) - ID pairs of device groups for which the rule is applied.
- device
Trust List<String>Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices
SSLInspection
Rules Devices - (Block List) - ID pairs of devices for which the rule is applied
- groups
SSLInspection
Rules Groups - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels
SSLInspection
Rules Labels - (Block List) - ID pairs of labels associated with the rule.
- location
Groups SSLInspectionRules Location Groups - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations
SSLInspection
Rules Locations - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name String
- The name of the SSL Inspection rule
- platforms List<String>
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy
Gateways SSLInspectionRules Proxy Gateways - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank Integer
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road
Warrior BooleanFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- source
Ip SSLInspectionGroups Rules Source Ip Groups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state String
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time
Windows SSLInspectionRules Time Windows - (Block List) - The time intervals during which the rule applies
- url
Categories List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user
Agent List<String>Types - (Set of String) - A list of user agent types the rule applies to.
- users
SSLInspection
Rules Users - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload
Groups List<SSLInspectionRules Workload Group> - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa
App List<SSLInspectionSegments Rules Zpa App Segment> - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- order number
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- actions
SSLInspection
Rules Action[] - (Block List) - Action taken when the traffic matches policy
- cloud
Applications string[] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments
SSLInspection
Rules Departments - (Block List) - ID pairs of departments for which the rule is applied.
- description string
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Ip SSLInspectionGroups Rules Dest Ip Groups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device
Groups SSLInspectionRules Device Groups - (Block List) - ID pairs of device groups for which the rule is applied.
- device
Trust string[]Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices
SSLInspection
Rules Devices - (Block List) - ID pairs of devices for which the rule is applied
- groups
SSLInspection
Rules Groups - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels
SSLInspection
Rules Labels - (Block List) - ID pairs of labels associated with the rule.
- location
Groups SSLInspectionRules Location Groups - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations
SSLInspection
Rules Locations - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name string
- The name of the SSL Inspection rule
- platforms string[]
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy
Gateways SSLInspectionRules Proxy Gateways - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank number
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road
Warrior booleanFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- source
Ip SSLInspectionGroups Rules Source Ip Groups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state string
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time
Windows SSLInspectionRules Time Windows - (Block List) - The time intervals during which the rule applies
- url
Categories string[] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user
Agent string[]Types - (Set of String) - A list of user agent types the rule applies to.
- users
SSLInspection
Rules Users - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload
Groups SSLInspectionRules Workload Group[] - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa
App SSLInspectionSegments Rules Zpa App Segment[] - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- order int
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- actions
Sequence[SSLInspection
Rules Action Args] - (Block List) - Action taken when the traffic matches policy
- cloud_
applications Sequence[str] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments
SSLInspection
Rules Departments Args - (Block List) - ID pairs of departments for which the rule is applied.
- description str
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest_
ip_ SSLInspectiongroups Rules Dest Ip Groups Args - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device_
groups SSLInspectionRules Device Groups Args - (Block List) - ID pairs of device groups for which the rule is applied.
- device_
trust_ Sequence[str]levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices
SSLInspection
Rules Devices Args - (Block List) - ID pairs of devices for which the rule is applied
- groups
SSLInspection
Rules Groups Args - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels
SSLInspection
Rules Labels Args - (Block List) - ID pairs of labels associated with the rule.
- location_
groups SSLInspectionRules Location Groups Args - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations
SSLInspection
Rules Locations Args - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name str
- The name of the SSL Inspection rule
- platforms Sequence[str]
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy_
gateways SSLInspectionRules Proxy Gateways Args - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank int
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road_
warrior_ boolfor_ kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- source_
ip_ SSLInspectiongroups Rules Source Ip Groups Args - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state str
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time_
windows SSLInspectionRules Time Windows Args - (Block List) - The time intervals during which the rule applies
- url_
categories Sequence[str] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user_
agent_ Sequence[str]types - (Set of String) - A list of user agent types the rule applies to.
- users
SSLInspection
Rules Users Args - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload_
groups Sequence[SSLInspectionRules Workload Group Args] - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa_
app_ Sequence[SSLInspectionsegments Rules Zpa App Segment Args] - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- order Number
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- actions List<Property Map>
- (Block List) - Action taken when the traffic matches policy
- cloud
Applications List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments Property Map
- (Block List) - ID pairs of departments for which the rule is applied.
- description String
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Ip Property MapGroups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device
Groups Property Map - (Block List) - ID pairs of device groups for which the rule is applied.
- device
Trust List<String>Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices Property Map
- (Block List) - ID pairs of devices for which the rule is applied
- groups Property Map
- (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels Property Map
- (Block List) - ID pairs of labels associated with the rule.
- location
Groups Property Map - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations Property Map
- (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name String
- The name of the SSL Inspection rule
- platforms List<String>
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy
Gateways Property Map - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank Number
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road
Warrior BooleanFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- source
Ip Property MapGroups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state String
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time
Windows Property Map - (Block List) - The time intervals during which the rule applies
- url
Categories List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user
Agent List<String>Types - (Set of String) - A list of user agent types the rule applies to.
- users Property Map
- (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload
Groups List<Property Map> - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa
App List<Property Map>Segments - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
Outputs
All input properties are implicitly available as output properties. Additionally, the SSLInspectionRules resource produces the following output properties:
Look up Existing SSLInspectionRules Resource
Get an existing SSLInspectionRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SSLInspectionRulesState, opts?: CustomResourceOptions): SSLInspectionRules
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
actions: Optional[Sequence[SSLInspectionRulesActionArgs]] = None,
cloud_applications: Optional[Sequence[str]] = None,
departments: Optional[SSLInspectionRulesDepartmentsArgs] = None,
description: Optional[str] = None,
dest_ip_groups: Optional[SSLInspectionRulesDestIpGroupsArgs] = None,
device_groups: Optional[SSLInspectionRulesDeviceGroupsArgs] = None,
device_trust_levels: Optional[Sequence[str]] = None,
devices: Optional[SSLInspectionRulesDevicesArgs] = None,
groups: Optional[SSLInspectionRulesGroupsArgs] = None,
labels: Optional[SSLInspectionRulesLabelsArgs] = None,
location_groups: Optional[SSLInspectionRulesLocationGroupsArgs] = None,
locations: Optional[SSLInspectionRulesLocationsArgs] = None,
name: Optional[str] = None,
order: Optional[int] = None,
platforms: Optional[Sequence[str]] = None,
proxy_gateways: Optional[SSLInspectionRulesProxyGatewaysArgs] = None,
rank: Optional[int] = None,
road_warrior_for_kerberos: Optional[bool] = None,
rule_id: Optional[int] = None,
source_ip_groups: Optional[SSLInspectionRulesSourceIpGroupsArgs] = None,
state: Optional[str] = None,
time_windows: Optional[SSLInspectionRulesTimeWindowsArgs] = None,
url_categories: Optional[Sequence[str]] = None,
user_agent_types: Optional[Sequence[str]] = None,
users: Optional[SSLInspectionRulesUsersArgs] = None,
workload_groups: Optional[Sequence[SSLInspectionRulesWorkloadGroupArgs]] = None,
zpa_app_segments: Optional[Sequence[SSLInspectionRulesZpaAppSegmentArgs]] = None) -> SSLInspectionRules
func GetSSLInspectionRules(ctx *Context, name string, id IDInput, state *SSLInspectionRulesState, opts ...ResourceOption) (*SSLInspectionRules, error)
public static SSLInspectionRules Get(string name, Input<string> id, SSLInspectionRulesState? state, CustomResourceOptions? opts = null)
public static SSLInspectionRules get(String name, Output<String> id, SSLInspectionRulesState state, CustomResourceOptions options)
resources: _: type: zia:SSLInspectionRules get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Actions
List<zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Action> - (Block List) - Action taken when the traffic matches policy
- Cloud
Applications List<string> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- Departments
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Departments - (Block List) - ID pairs of departments for which the rule is applied.
- Description string
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Ip zscaler.Groups Pulumi Package. Zia. Inputs. SSLInspection Rules Dest Ip Groups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- Device
Groups zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Device Groups - (Block List) - ID pairs of device groups for which the rule is applied.
- Device
Trust List<string>Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- Devices
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Devices - (Block List) - ID pairs of devices for which the rule is applied
- Groups
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Groups - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- Labels
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Labels - (Block List) - ID pairs of labels associated with the rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Location Groups - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- Locations
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Locations - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- Name string
- The name of the SSL Inspection rule
- Order int
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Platforms List<string>
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- Proxy
Gateways zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Proxy Gateways - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- Rank int
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- Road
Warrior boolFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- Rule
Id int - Source
Ip zscaler.Groups Pulumi Package. Zia. Inputs. SSLInspection Rules Source Ip Groups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- State string
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Time Windows - (Block List) - The time intervals during which the rule applies
- Url
Categories List<string> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- User
Agent List<string>Types - (Set of String) - A list of user agent types the rule applies to.
- Users
zscaler.
Pulumi Package. Zia. Inputs. SSLInspection Rules Users - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Workload
Groups List<zscaler.Pulumi Package. Zia. Inputs. SSLInspection Rules Workload Group> - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Zpa
App List<zscaler.Segments Pulumi Package. Zia. Inputs. SSLInspection Rules Zpa App Segment> - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- Actions
[]SSLInspection
Rules Action Args - (Block List) - Action taken when the traffic matches policy
- Cloud
Applications []string - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- Departments
SSLInspection
Rules Departments Args - (Block List) - ID pairs of departments for which the rule is applied.
- Description string
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Ip SSLInspectionGroups Rules Dest Ip Groups Args - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- Device
Groups SSLInspectionRules Device Groups Args - (Block List) - ID pairs of device groups for which the rule is applied.
- Device
Trust []stringLevels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- Devices
SSLInspection
Rules Devices Args - (Block List) - ID pairs of devices for which the rule is applied
- Groups
SSLInspection
Rules Groups Args - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- Labels
SSLInspection
Rules Labels Args - (Block List) - ID pairs of labels associated with the rule.
- Location
Groups SSLInspectionRules Location Groups Args - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- Locations
SSLInspection
Rules Locations Args - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- Name string
- The name of the SSL Inspection rule
- Order int
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Platforms []string
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- Proxy
Gateways SSLInspectionRules Proxy Gateways Args - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- Rank int
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- Road
Warrior boolFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- Rule
Id int - Source
Ip SSLInspectionGroups Rules Source Ip Groups Args - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- State string
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- Time
Windows SSLInspectionRules Time Windows Args - (Block List) - The time intervals during which the rule applies
- Url
Categories []string - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- User
Agent []stringTypes - (Set of String) - A list of user agent types the rule applies to.
- Users
SSLInspection
Rules Users Args - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Workload
Groups []SSLInspectionRules Workload Group Args - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- Zpa
App []SSLInspectionSegments Rules Zpa App Segment Args - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- actions
List<SSLInspection
Rules Action> - (Block List) - Action taken when the traffic matches policy
- cloud
Applications List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments
SSLInspection
Rules Departments - (Block List) - ID pairs of departments for which the rule is applied.
- description String
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Ip SSLInspectionGroups Rules Dest Ip Groups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device
Groups SSLInspectionRules Device Groups - (Block List) - ID pairs of device groups for which the rule is applied.
- device
Trust List<String>Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices
SSLInspection
Rules Devices - (Block List) - ID pairs of devices for which the rule is applied
- groups
SSLInspection
Rules Groups - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels
SSLInspection
Rules Labels - (Block List) - ID pairs of labels associated with the rule.
- location
Groups SSLInspectionRules Location Groups - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations
SSLInspection
Rules Locations - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name String
- The name of the SSL Inspection rule
- order Integer
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- platforms List<String>
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy
Gateways SSLInspectionRules Proxy Gateways - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank Integer
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road
Warrior BooleanFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- rule
Id Integer - source
Ip SSLInspectionGroups Rules Source Ip Groups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state String
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time
Windows SSLInspectionRules Time Windows - (Block List) - The time intervals during which the rule applies
- url
Categories List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user
Agent List<String>Types - (Set of String) - A list of user agent types the rule applies to.
- users
SSLInspection
Rules Users - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload
Groups List<SSLInspectionRules Workload Group> - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa
App List<SSLInspectionSegments Rules Zpa App Segment> - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- actions
SSLInspection
Rules Action[] - (Block List) - Action taken when the traffic matches policy
- cloud
Applications string[] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments
SSLInspection
Rules Departments - (Block List) - ID pairs of departments for which the rule is applied.
- description string
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Ip SSLInspectionGroups Rules Dest Ip Groups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device
Groups SSLInspectionRules Device Groups - (Block List) - ID pairs of device groups for which the rule is applied.
- device
Trust string[]Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices
SSLInspection
Rules Devices - (Block List) - ID pairs of devices for which the rule is applied
- groups
SSLInspection
Rules Groups - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels
SSLInspection
Rules Labels - (Block List) - ID pairs of labels associated with the rule.
- location
Groups SSLInspectionRules Location Groups - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations
SSLInspection
Rules Locations - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name string
- The name of the SSL Inspection rule
- order number
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- platforms string[]
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy
Gateways SSLInspectionRules Proxy Gateways - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank number
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road
Warrior booleanFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- rule
Id number - source
Ip SSLInspectionGroups Rules Source Ip Groups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state string
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time
Windows SSLInspectionRules Time Windows - (Block List) - The time intervals during which the rule applies
- url
Categories string[] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user
Agent string[]Types - (Set of String) - A list of user agent types the rule applies to.
- users
SSLInspection
Rules Users - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload
Groups SSLInspectionRules Workload Group[] - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa
App SSLInspectionSegments Rules Zpa App Segment[] - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- actions
Sequence[SSLInspection
Rules Action Args] - (Block List) - Action taken when the traffic matches policy
- cloud_
applications Sequence[str] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments
SSLInspection
Rules Departments Args - (Block List) - ID pairs of departments for which the rule is applied.
- description str
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest_
ip_ SSLInspectiongroups Rules Dest Ip Groups Args - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device_
groups SSLInspectionRules Device Groups Args - (Block List) - ID pairs of device groups for which the rule is applied.
- device_
trust_ Sequence[str]levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices
SSLInspection
Rules Devices Args - (Block List) - ID pairs of devices for which the rule is applied
- groups
SSLInspection
Rules Groups Args - (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels
SSLInspection
Rules Labels Args - (Block List) - ID pairs of labels associated with the rule.
- location_
groups SSLInspectionRules Location Groups Args - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations
SSLInspection
Rules Locations Args - (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name str
- The name of the SSL Inspection rule
- order int
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- platforms Sequence[str]
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy_
gateways SSLInspectionRules Proxy Gateways Args - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank int
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road_
warrior_ boolfor_ kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- rule_
id int - source_
ip_ SSLInspectiongroups Rules Source Ip Groups Args - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state str
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time_
windows SSLInspectionRules Time Windows Args - (Block List) - The time intervals during which the rule applies
- url_
categories Sequence[str] - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user_
agent_ Sequence[str]types - (Set of String) - A list of user agent types the rule applies to.
- users
SSLInspection
Rules Users Args - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload_
groups Sequence[SSLInspectionRules Workload Group Args] - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa_
app_ Sequence[SSLInspectionsegments Rules Zpa App Segment Args] - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
- actions List<Property Map>
- (Block List) - Action taken when the traffic matches policy
- cloud
Applications List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
- departments Property Map
- (Block List) - ID pairs of departments for which the rule is applied.
- description String
- (String) - Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Ip Property MapGroups - (Block List) - ID pairs of destination IP address groups for which the rule is applied.
- device
Groups Property Map - (Block List) - ID pairs of device groups for which the rule is applied.
- device
Trust List<String>Levels - (Set of String) - List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations in the Zscaler Client Connector Portal. If no value is set, this field is ignored during the policy evaluation. Supported values:
ANY
,UNKNOWN_DEVICETRUSTLEVEL
,LOW_TRUST
,MEDIUM_TRUST
,HIGH_TRUST
- devices Property Map
- (Block List) - ID pairs of devices for which the rule is applied
- groups Property Map
- (Block List) - ID pairs of groups for which the rule is applied. If not set, rule is applied for all groups.
- labels Property Map
- (Block List) - ID pairs of labels associated with the rule.
- location
Groups Property Map - (Block List) - ID pairs of location groups to which the rule is applied. When empty, it implies applying to all location groups.
- locations Property Map
- (Block List) - ID pairs of locations to which the rule is applied. When empty, it implies applying to all locations.
- name String
- The name of the SSL Inspection rule
- order Number
- (String) - Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- platforms List<String>
- (Set of String) - Zscaler Client Connector device platforms for which this rule is applied. Supported Values:
SCAN_IOS
,SCAN_ANDROID
,SCAN_MACOS
,SCAN_WINDOWS
,NO_CLIENT_CONNECTOR
,SCAN_LINUX
- proxy
Gateways Property Map - (Block List) - When using ZPA Gateway forwarding, name-ID pairs of ZPA Application Segments for which the rule is applicable.
- rank Number
- (Integer) - The admin rank specified for the rule based on your assigned admin rank. Admin rank determines the rule order that can be specified for the rule. Admin rank can be configured if it is enabled in the Advanced Settings.
- road
Warrior BooleanFor Kerberos - (Boolean) - Indicates whether this rule is applied to remote users that use PAC with Kerberos authentication.
- rule
Id Number - source
Ip Property MapGroups - (Block List) - ID pairs of source IP address groups for which the rule is applied.
- state String
- (String) - The state of the rule indicating whether it is enabled or disabled. Supported values:
ENABLED
orDISABLED
- time
Windows Property Map - (Block List) - The time intervals during which the rule applies
- url
Categories List<String> - (Set of String) - The list of URL categories to which the DLP policy rule must be applied.
- user
Agent List<String>Types - (Set of String) - A list of user agent types the rule applies to.
- users Property Map
- (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- workload
Groups List<Property Map> - (Block List) - The list of preconfigured workload groups to which the policy must be applied.
- zpa
App List<Property Map>Segments - (Block List) - The list of ZPA Application Segments for which this rule is applicable (applicable only for ZPA Gateway forwarding).
Supporting Types
SSLInspectionRulesAction, SSLInspectionRulesActionArgs
- Decrypt
Sub List<zscaler.Actions Pulumi Package. Zia. Inputs. SSLInspection Rules Action Decrypt Sub Action> - (Block List) - Action taken when enabling SSL intercept
- Do
Not List<zscaler.Decrypt Sub Actions Pulumi Package. Zia. Inputs. SSLInspection Rules Action Do Not Decrypt Sub Action> - (Block List) - Action taken when bypassing SSL intercept
- Override
Default boolCertificate - (Boolean) - Whether to override the default SSL interception certificate.
- Show
Eun bool - (Boolean) - Enable this setting to display end user notifications.
- Show
Eunatp bool - (Boolean) - Whether to display the EUN ATP page.
- Ssl
Interception List<zscaler.Certs Pulumi Package. Zia. Inputs. SSLInspection Rules Action Ssl Interception Cert> - has the following attributes:
NOTE This block can only be set when
override_default_certificate
istrue
- Type string
- (String) - The action type for this rule. Possible values:
BLOCK
.
- Decrypt
Sub []SSLInspectionActions Rules Action Decrypt Sub Action - (Block List) - Action taken when enabling SSL intercept
- Do
Not []SSLInspectionDecrypt Sub Actions Rules Action Do Not Decrypt Sub Action - (Block List) - Action taken when bypassing SSL intercept
- Override
Default boolCertificate - (Boolean) - Whether to override the default SSL interception certificate.
- Show
Eun bool - (Boolean) - Enable this setting to display end user notifications.
- Show
Eunatp bool - (Boolean) - Whether to display the EUN ATP page.
- Ssl
Interception []SSLInspectionCerts Rules Action Ssl Interception Cert - has the following attributes:
NOTE This block can only be set when
override_default_certificate
istrue
- Type string
- (String) - The action type for this rule. Possible values:
BLOCK
.
- decrypt
Sub List<SSLInspectionActions Rules Action Decrypt Sub Action> - (Block List) - Action taken when enabling SSL intercept
- do
Not List<SSLInspectionDecrypt Sub Actions Rules Action Do Not Decrypt Sub Action> - (Block List) - Action taken when bypassing SSL intercept
- override
Default BooleanCertificate - (Boolean) - Whether to override the default SSL interception certificate.
- show
Eun Boolean - (Boolean) - Enable this setting to display end user notifications.
- show
Eunatp Boolean - (Boolean) - Whether to display the EUN ATP page.
- ssl
Interception List<SSLInspectionCerts Rules Action Ssl Interception Cert> - has the following attributes:
NOTE This block can only be set when
override_default_certificate
istrue
- type String
- (String) - The action type for this rule. Possible values:
BLOCK
.
- decrypt
Sub SSLInspectionActions Rules Action Decrypt Sub Action[] - (Block List) - Action taken when enabling SSL intercept
- do
Not SSLInspectionDecrypt Sub Actions Rules Action Do Not Decrypt Sub Action[] - (Block List) - Action taken when bypassing SSL intercept
- override
Default booleanCertificate - (Boolean) - Whether to override the default SSL interception certificate.
- show
Eun boolean - (Boolean) - Enable this setting to display end user notifications.
- show
Eunatp boolean - (Boolean) - Whether to display the EUN ATP page.
- ssl
Interception SSLInspectionCerts Rules Action Ssl Interception Cert[] - has the following attributes:
NOTE This block can only be set when
override_default_certificate
istrue
- type string
- (String) - The action type for this rule. Possible values:
BLOCK
.
- decrypt_
sub_ Sequence[SSLInspectionactions Rules Action Decrypt Sub Action] - (Block List) - Action taken when enabling SSL intercept
- do_
not_ Sequence[SSLInspectiondecrypt_ sub_ actions Rules Action Do Not Decrypt Sub Action] - (Block List) - Action taken when bypassing SSL intercept
- override_
default_ boolcertificate - (Boolean) - Whether to override the default SSL interception certificate.
- show_
eun bool - (Boolean) - Enable this setting to display end user notifications.
- show_
eunatp bool - (Boolean) - Whether to display the EUN ATP page.
- ssl_
interception_ Sequence[SSLInspectioncerts Rules Action Ssl Interception Cert] - has the following attributes:
NOTE This block can only be set when
override_default_certificate
istrue
- type str
- (String) - The action type for this rule. Possible values:
BLOCK
.
- decrypt
Sub List<Property Map>Actions - (Block List) - Action taken when enabling SSL intercept
- do
Not List<Property Map>Decrypt Sub Actions - (Block List) - Action taken when bypassing SSL intercept
- override
Default BooleanCertificate - (Boolean) - Whether to override the default SSL interception certificate.
- show
Eun Boolean - (Boolean) - Enable this setting to display end user notifications.
- show
Eunatp Boolean - (Boolean) - Whether to display the EUN ATP page.
- ssl
Interception List<Property Map>Certs - has the following attributes:
NOTE This block can only be set when
override_default_certificate
istrue
- type String
- (String) - The action type for this rule. Possible values:
BLOCK
.
SSLInspectionRulesActionDecryptSubAction, SSLInspectionRulesActionDecryptSubActionArgs
- Block
Ssl boolTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- Block
Undecrypt bool - (Boolean) - Enable to block traffic from servers that use non-standard encryption methods or require mutual TLS authentication.
- Http2Enabled bool
- (Boolean)
- Min
Client stringTls Version - (String) - The minimum TLS version allowed on the client side: Supported Values are:
CLIENT_TLS_1_0
,CLIENT_TLS_1_1
,CLIENT_TLS_1_2
,CLIENT_TLS_1_3
. - Min
Server stringTls Version - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. - Ocsp
Check bool - (Boolean) - Whether to enable OCSP check.
- Server
Certificates string - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- Block
Ssl boolTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- Block
Undecrypt bool - (Boolean) - Enable to block traffic from servers that use non-standard encryption methods or require mutual TLS authentication.
- Http2Enabled bool
- (Boolean)
- Min
Client stringTls Version - (String) - The minimum TLS version allowed on the client side: Supported Values are:
CLIENT_TLS_1_0
,CLIENT_TLS_1_1
,CLIENT_TLS_1_2
,CLIENT_TLS_1_3
. - Min
Server stringTls Version - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. - Ocsp
Check bool - (Boolean) - Whether to enable OCSP check.
- Server
Certificates string - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block
Ssl BooleanTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- block
Undecrypt Boolean - (Boolean) - Enable to block traffic from servers that use non-standard encryption methods or require mutual TLS authentication.
- http2Enabled Boolean
- (Boolean)
- min
Client StringTls Version - (String) - The minimum TLS version allowed on the client side: Supported Values are:
CLIENT_TLS_1_0
,CLIENT_TLS_1_1
,CLIENT_TLS_1_2
,CLIENT_TLS_1_3
. - min
Server StringTls Version - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. - ocsp
Check Boolean - (Boolean) - Whether to enable OCSP check.
- server
Certificates String - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block
Ssl booleanTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- block
Undecrypt boolean - (Boolean) - Enable to block traffic from servers that use non-standard encryption methods or require mutual TLS authentication.
- http2Enabled boolean
- (Boolean)
- min
Client stringTls Version - (String) - The minimum TLS version allowed on the client side: Supported Values are:
CLIENT_TLS_1_0
,CLIENT_TLS_1_1
,CLIENT_TLS_1_2
,CLIENT_TLS_1_3
. - min
Server stringTls Version - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. - ocsp
Check boolean - (Boolean) - Whether to enable OCSP check.
- server
Certificates string - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block_
ssl_ booltraffic_ with_ no_ sni_ enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- block_
undecrypt bool - (Boolean) - Enable to block traffic from servers that use non-standard encryption methods or require mutual TLS authentication.
- http2_
enabled bool - (Boolean)
- min_
client_ strtls_ version - (String) - The minimum TLS version allowed on the client side: Supported Values are:
CLIENT_TLS_1_0
,CLIENT_TLS_1_1
,CLIENT_TLS_1_2
,CLIENT_TLS_1_3
. - min_
server_ strtls_ version - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. - ocsp_
check bool - (Boolean) - Whether to enable OCSP check.
- server_
certificates str - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block
Ssl BooleanTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- block
Undecrypt Boolean - (Boolean) - Enable to block traffic from servers that use non-standard encryption methods or require mutual TLS authentication.
- http2Enabled Boolean
- (Boolean)
- min
Client StringTls Version - (String) - The minimum TLS version allowed on the client side: Supported Values are:
CLIENT_TLS_1_0
,CLIENT_TLS_1_1
,CLIENT_TLS_1_2
,CLIENT_TLS_1_3
. - min
Server StringTls Version - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. - ocsp
Check Boolean - (Boolean) - Whether to enable OCSP check.
- server
Certificates String - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
SSLInspectionRulesActionDoNotDecryptSubAction, SSLInspectionRulesActionDoNotDecryptSubActionArgs
- Block
Ssl boolTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- Bypass
Other boolPolicies - (Boolean) - Whether to bypass other policies when action is set to
DO_NOT_DECRYPT
. - Min
Tls stringVersion - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. NOTEmin_tls_version
andserver_certificates
CANNOT be set ifbypass_other_policies
istrue
- Ocsp
Check bool - (Boolean) - Whether to enable OCSP check.
- Server
Certificates string - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- Block
Ssl boolTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- Bypass
Other boolPolicies - (Boolean) - Whether to bypass other policies when action is set to
DO_NOT_DECRYPT
. - Min
Tls stringVersion - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. NOTEmin_tls_version
andserver_certificates
CANNOT be set ifbypass_other_policies
istrue
- Ocsp
Check bool - (Boolean) - Whether to enable OCSP check.
- Server
Certificates string - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block
Ssl BooleanTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- bypass
Other BooleanPolicies - (Boolean) - Whether to bypass other policies when action is set to
DO_NOT_DECRYPT
. - min
Tls StringVersion - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. NOTEmin_tls_version
andserver_certificates
CANNOT be set ifbypass_other_policies
istrue
- ocsp
Check Boolean - (Boolean) - Whether to enable OCSP check.
- server
Certificates String - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block
Ssl booleanTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- bypass
Other booleanPolicies - (Boolean) - Whether to bypass other policies when action is set to
DO_NOT_DECRYPT
. - min
Tls stringVersion - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. NOTEmin_tls_version
andserver_certificates
CANNOT be set ifbypass_other_policies
istrue
- ocsp
Check boolean - (Boolean) - Whether to enable OCSP check.
- server
Certificates string - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block_
ssl_ booltraffic_ with_ no_ sni_ enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- bypass_
other_ boolpolicies - (Boolean) - Whether to bypass other policies when action is set to
DO_NOT_DECRYPT
. - min_
tls_ strversion - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. NOTEmin_tls_version
andserver_certificates
CANNOT be set ifbypass_other_policies
istrue
- ocsp_
check bool - (Boolean) - Whether to enable OCSP check.
- server_
certificates str - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
- block
Ssl BooleanTraffic With No Sni Enabled - (Boolean) - Whether to block SSL traffic when SNI is not present.
- bypass
Other BooleanPolicies - (Boolean) - Whether to bypass other policies when action is set to
DO_NOT_DECRYPT
. - min
Tls StringVersion - (String) - The minimum TLS version allowed on the server side: Supported Values are:
SERVER_TLS_1_0
,SERVER_TLS_1_1
,SERVER_TLS_1_2
,SERVER_TLS_1_3
. NOTEmin_tls_version
andserver_certificates
CANNOT be set ifbypass_other_policies
istrue
- ocsp
Check Boolean - (Boolean) - Whether to enable OCSP check.
- server
Certificates String - (String) - Action to take on server certificates. Valid values might include
ALLOW
,BLOCK
, orPASS_THRU
.
SSLInspectionRulesActionSslInterceptionCert, SSLInspectionRulesActionSslInterceptionCertArgs
- Id int
- (Integer) - A unique identifier assigned to the workload group
- Id int
- (Integer) - A unique identifier assigned to the workload group
- id Integer
- (Integer) - A unique identifier assigned to the workload group
- id number
- (Integer) - A unique identifier assigned to the workload group
- id int
- (Integer) - A unique identifier assigned to the workload group
- id Number
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesDepartments, SSLInspectionRulesDepartmentsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesDestIpGroups, SSLInspectionRulesDestIpGroupsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesDeviceGroups, SSLInspectionRulesDeviceGroupsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesDevices, SSLInspectionRulesDevicesArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesGroups, SSLInspectionRulesGroupsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesLabels, SSLInspectionRulesLabelsArgs
- Id int
- (Integer) - A unique identifier assigned to the workload group
- Id int
- (Integer) - A unique identifier assigned to the workload group
- id Integer
- (Integer) - A unique identifier assigned to the workload group
- id number
- (Integer) - A unique identifier assigned to the workload group
- id int
- (Integer) - A unique identifier assigned to the workload group
- id Number
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesLocationGroups, SSLInspectionRulesLocationGroupsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesLocations, SSLInspectionRulesLocationsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesProxyGateways, SSLInspectionRulesProxyGatewaysArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesSourceIpGroups, SSLInspectionRulesSourceIpGroupsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesTimeWindows, SSLInspectionRulesTimeWindowsArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesUsers, SSLInspectionRulesUsersArgs
- Ids List<int>
- (Integer) - A unique identifier assigned to the workload group
- Ids []int
- (Integer) - A unique identifier assigned to the workload group
- ids List<Integer>
- (Integer) - A unique identifier assigned to the workload group
- ids number[]
- (Integer) - A unique identifier assigned to the workload group
- ids Sequence[int]
- (Integer) - A unique identifier assigned to the workload group
- ids List<Number>
- (Integer) - A unique identifier assigned to the workload group
SSLInspectionRulesWorkloadGroup, SSLInspectionRulesWorkloadGroupArgs
SSLInspectionRulesZpaAppSegment, SSLInspectionRulesZpaAppSegmentArgs
- External
Id string - External ID of the application segment.
- Name string
- Name of the application segment.
- External
Id string - External ID of the application segment.
- Name string
- Name of the application segment.
- external
Id String - External ID of the application segment.
- name String
- Name of the application segment.
- external
Id string - External ID of the application segment.
- name string
- Name of the application segment.
- external_
id str - External ID of the application segment.
- name str
- Name of the application segment.
- external
Id String - External ID of the application segment.
- name String
- Name of the application segment.
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.