azure-native.videoanalyzer.AccessPolicy
Explore with Pulumi AI
Access policies help define the authentication rules, and control access to specific video resources. Azure REST API version: 2021-11-01-preview. Prior API version in Azure Native 1.x: 2021-05-01-preview.
Example Usage
Register access policy entity.
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var accessPolicy = new AzureNative.VideoAnalyzer.AccessPolicy("accessPolicy", new()
{
AccessPolicyName = "accessPolicyName1",
AccountName = "testaccount2",
Authentication = new AzureNative.VideoAnalyzer.Inputs.JwtAuthenticationArgs
{
Audiences = new[]
{
"audience1",
},
Claims = new[]
{
new AzureNative.VideoAnalyzer.Inputs.TokenClaimArgs
{
Name = "claimname1",
Value = "claimvalue1",
},
new AzureNative.VideoAnalyzer.Inputs.TokenClaimArgs
{
Name = "claimname2",
Value = "claimvalue2",
},
},
Issuers = new[]
{
"issuer1",
"issuer2",
},
Keys =
{
new AzureNative.VideoAnalyzer.Inputs.RsaTokenKeyArgs
{
Alg = AzureNative.VideoAnalyzer.AccessPolicyRsaAlgo.RS256,
E = "ZLFzZTY0IQ==",
Kid = "123",
N = "YmFzZTY0IQ==",
Type = "#Microsoft.VideoAnalyzer.RsaTokenKey",
},
new AzureNative.VideoAnalyzer.Inputs.EccTokenKeyArgs
{
Alg = AzureNative.VideoAnalyzer.AccessPolicyEccAlgo.ES256,
Kid = "124",
Type = "#Microsoft.VideoAnalyzer.EccTokenKey",
X = "XX==",
Y = "YY==",
},
},
Type = "#Microsoft.VideoAnalyzer.JwtAuthentication",
},
ResourceGroupName = "testrg",
});
});
package main
import (
videoanalyzer "github.com/pulumi/pulumi-azure-native-sdk/videoanalyzer/v2"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := videoanalyzer.NewAccessPolicy(ctx, "accessPolicy", &videoanalyzer.AccessPolicyArgs{
AccessPolicyName: pulumi.String("accessPolicyName1"),
AccountName: pulumi.String("testaccount2"),
Authentication: &videoanalyzer.JwtAuthenticationArgs{
Audiences: pulumi.StringArray{
pulumi.String("audience1"),
},
Claims: videoanalyzer.TokenClaimArray{
&videoanalyzer.TokenClaimArgs{
Name: pulumi.String("claimname1"),
Value: pulumi.String("claimvalue1"),
},
&videoanalyzer.TokenClaimArgs{
Name: pulumi.String("claimname2"),
Value: pulumi.String("claimvalue2"),
},
},
Issuers: pulumi.StringArray{
pulumi.String("issuer1"),
pulumi.String("issuer2"),
},
Keys: pulumi.Array{
videoanalyzer.RsaTokenKey{
Alg: videoanalyzer.AccessPolicyRsaAlgoRS256,
E: "ZLFzZTY0IQ==",
Kid: "123",
N: "YmFzZTY0IQ==",
Type: "#Microsoft.VideoAnalyzer.RsaTokenKey",
},
videoanalyzer.EccTokenKey{
Alg: videoanalyzer.AccessPolicyEccAlgoES256,
Kid: "124",
Type: "#Microsoft.VideoAnalyzer.EccTokenKey",
X: "XX==",
Y: "YY==",
},
},
Type: pulumi.String("#Microsoft.VideoAnalyzer.JwtAuthentication"),
},
ResourceGroupName: pulumi.String("testrg"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.videoanalyzer.AccessPolicy;
import com.pulumi.azurenative.videoanalyzer.AccessPolicyArgs;
import com.pulumi.azurenative.videoanalyzer.inputs.JwtAuthenticationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var accessPolicy = new AccessPolicy("accessPolicy", AccessPolicyArgs.builder()
.accessPolicyName("accessPolicyName1")
.accountName("testaccount2")
.authentication(JwtAuthenticationArgs.builder()
.audiences("audience1")
.claims(
TokenClaimArgs.builder()
.name("claimname1")
.value("claimvalue1")
.build(),
TokenClaimArgs.builder()
.name("claimname2")
.value("claimvalue2")
.build())
.issuers(
"issuer1",
"issuer2")
.keys(
EccTokenKeyArgs.builder()
.alg("RS256")
.e("ZLFzZTY0IQ==")
.kid("123")
.n("YmFzZTY0IQ==")
.type("#Microsoft.VideoAnalyzer.RsaTokenKey")
.build(),
EccTokenKeyArgs.builder()
.alg("ES256")
.kid("124")
.type("#Microsoft.VideoAnalyzer.EccTokenKey")
.x("XX==")
.y("YY==")
.build())
.type("#Microsoft.VideoAnalyzer.JwtAuthentication")
.build())
.resourceGroupName("testrg")
.build());
}
}
import pulumi
import pulumi_azure_native as azure_native
access_policy = azure_native.videoanalyzer.AccessPolicy("accessPolicy",
access_policy_name="accessPolicyName1",
account_name="testaccount2",
authentication={
"audiences": ["audience1"],
"claims": [
{
"name": "claimname1",
"value": "claimvalue1",
},
{
"name": "claimname2",
"value": "claimvalue2",
},
],
"issuers": [
"issuer1",
"issuer2",
],
"keys": [
{
"alg": azure_native.videoanalyzer.AccessPolicyRsaAlgo.RS256,
"e": "ZLFzZTY0IQ==",
"kid": "123",
"n": "YmFzZTY0IQ==",
"type": "#Microsoft.VideoAnalyzer.RsaTokenKey",
},
{
"alg": azure_native.videoanalyzer.AccessPolicyEccAlgo.ES256,
"kid": "124",
"type": "#Microsoft.VideoAnalyzer.EccTokenKey",
"x": "XX==",
"y": "YY==",
},
],
"type": "#Microsoft.VideoAnalyzer.JwtAuthentication",
},
resource_group_name="testrg")
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const accessPolicy = new azure_native.videoanalyzer.AccessPolicy("accessPolicy", {
accessPolicyName: "accessPolicyName1",
accountName: "testaccount2",
authentication: {
audiences: ["audience1"],
claims: [
{
name: "claimname1",
value: "claimvalue1",
},
{
name: "claimname2",
value: "claimvalue2",
},
],
issuers: [
"issuer1",
"issuer2",
],
keys: [
{
alg: azure_native.videoanalyzer.AccessPolicyRsaAlgo.RS256,
e: "ZLFzZTY0IQ==",
kid: "123",
n: "YmFzZTY0IQ==",
type: "#Microsoft.VideoAnalyzer.RsaTokenKey",
},
{
alg: azure_native.videoanalyzer.AccessPolicyEccAlgo.ES256,
kid: "124",
type: "#Microsoft.VideoAnalyzer.EccTokenKey",
x: "XX==",
y: "YY==",
},
],
type: "#Microsoft.VideoAnalyzer.JwtAuthentication",
},
resourceGroupName: "testrg",
});
resources:
accessPolicy:
type: azure-native:videoanalyzer:AccessPolicy
properties:
accessPolicyName: accessPolicyName1
accountName: testaccount2
authentication:
audiences:
- audience1
claims:
- name: claimname1
value: claimvalue1
- name: claimname2
value: claimvalue2
issuers:
- issuer1
- issuer2
keys:
- alg: RS256
e: ZLFzZTY0IQ==
kid: '123'
n: YmFzZTY0IQ==
type: '#Microsoft.VideoAnalyzer.RsaTokenKey'
- alg: ES256
kid: '124'
type: '#Microsoft.VideoAnalyzer.EccTokenKey'
x: XX==
y: YY==
type: '#Microsoft.VideoAnalyzer.JwtAuthentication'
resourceGroupName: testrg
Create AccessPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AccessPolicy(name: string, args: AccessPolicyArgs, opts?: CustomResourceOptions);
@overload
def AccessPolicy(resource_name: str,
args: AccessPolicyArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AccessPolicy(resource_name: str,
opts: Optional[ResourceOptions] = None,
account_name: Optional[str] = None,
resource_group_name: Optional[str] = None,
access_policy_name: Optional[str] = None,
authentication: Optional[JwtAuthenticationArgs] = None,
role: Optional[Union[str, AccessPolicyRole]] = None)
func NewAccessPolicy(ctx *Context, name string, args AccessPolicyArgs, opts ...ResourceOption) (*AccessPolicy, error)
public AccessPolicy(string name, AccessPolicyArgs args, CustomResourceOptions? opts = null)
public AccessPolicy(String name, AccessPolicyArgs args)
public AccessPolicy(String name, AccessPolicyArgs args, CustomResourceOptions options)
type: azure-native:videoanalyzer:AccessPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var exampleaccessPolicyResourceResourceFromVideoanalyzer = new AzureNative.VideoAnalyzer.AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer", new()
{
AccountName = "string",
ResourceGroupName = "string",
AccessPolicyName = "string",
Authentication = new AzureNative.VideoAnalyzer.Inputs.JwtAuthenticationArgs
{
Type = "#Microsoft.VideoAnalyzer.JwtAuthentication",
Audiences = new[]
{
"string",
},
Claims = new[]
{
new AzureNative.VideoAnalyzer.Inputs.TokenClaimArgs
{
Name = "string",
Value = "string",
},
},
Issuers = new[]
{
"string",
},
Keys = new[]
{
new AzureNative.VideoAnalyzer.Inputs.EccTokenKeyArgs
{
Alg = "string",
Kid = "string",
Type = "#Microsoft.VideoAnalyzer.EccTokenKey",
X = "string",
Y = "string",
},
},
},
Role = "string",
});
example, err := videoanalyzer.NewAccessPolicy(ctx, "exampleaccessPolicyResourceResourceFromVideoanalyzer", &videoanalyzer.AccessPolicyArgs{
AccountName: pulumi.String("string"),
ResourceGroupName: pulumi.String("string"),
AccessPolicyName: pulumi.String("string"),
Authentication: &videoanalyzer.JwtAuthenticationArgs{
Type: pulumi.String("#Microsoft.VideoAnalyzer.JwtAuthentication"),
Audiences: pulumi.StringArray{
pulumi.String("string"),
},
Claims: videoanalyzer.TokenClaimArray{
&videoanalyzer.TokenClaimArgs{
Name: pulumi.String("string"),
Value: pulumi.String("string"),
},
},
Issuers: pulumi.StringArray{
pulumi.String("string"),
},
Keys: pulumi.Array{
videoanalyzer.EccTokenKey{
Alg: "string",
Kid: "string",
Type: "#Microsoft.VideoAnalyzer.EccTokenKey",
X: "string",
Y: "string",
},
},
},
Role: pulumi.String("string"),
})
var exampleaccessPolicyResourceResourceFromVideoanalyzer = new AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer", AccessPolicyArgs.builder()
.accountName("string")
.resourceGroupName("string")
.accessPolicyName("string")
.authentication(JwtAuthenticationArgs.builder()
.type("#Microsoft.VideoAnalyzer.JwtAuthentication")
.audiences("string")
.claims(TokenClaimArgs.builder()
.name("string")
.value("string")
.build())
.issuers("string")
.keys(EccTokenKeyArgs.builder()
.alg("string")
.kid("string")
.type("#Microsoft.VideoAnalyzer.EccTokenKey")
.x("string")
.y("string")
.build())
.build())
.role("string")
.build());
exampleaccess_policy_resource_resource_from_videoanalyzer = azure_native.videoanalyzer.AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer",
account_name="string",
resource_group_name="string",
access_policy_name="string",
authentication={
"type": "#Microsoft.VideoAnalyzer.JwtAuthentication",
"audiences": ["string"],
"claims": [{
"name": "string",
"value": "string",
}],
"issuers": ["string"],
"keys": [{
"alg": "string",
"kid": "string",
"type": "#Microsoft.VideoAnalyzer.EccTokenKey",
"x": "string",
"y": "string",
}],
},
role="string")
const exampleaccessPolicyResourceResourceFromVideoanalyzer = new azure_native.videoanalyzer.AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer", {
accountName: "string",
resourceGroupName: "string",
accessPolicyName: "string",
authentication: {
type: "#Microsoft.VideoAnalyzer.JwtAuthentication",
audiences: ["string"],
claims: [{
name: "string",
value: "string",
}],
issuers: ["string"],
keys: [{
alg: "string",
kid: "string",
type: "#Microsoft.VideoAnalyzer.EccTokenKey",
x: "string",
y: "string",
}],
},
role: "string",
});
type: azure-native:videoanalyzer:AccessPolicy
properties:
accessPolicyName: string
accountName: string
authentication:
audiences:
- string
claims:
- name: string
value: string
issuers:
- string
keys:
- alg: string
kid: string
type: '#Microsoft.VideoAnalyzer.EccTokenKey'
x: string
"y": string
type: '#Microsoft.VideoAnalyzer.JwtAuthentication'
resourceGroupName: string
role: string
AccessPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AccessPolicy resource accepts the following input properties:
- Account
Name string - The Azure Video Analyzer account name.
- Resource
Group stringName - The name of the resource group. The name is case insensitive.
- Access
Policy stringName - The Access Policy name.
- Authentication
Pulumi.
Azure Native. Video Analyzer. Inputs. Jwt Authentication - Authentication method to be used when validating client API access.
- Role
string | Pulumi.
Azure Native. Video Analyzer. Access Policy Role - Defines the access level granted by this policy.
- Account
Name string - The Azure Video Analyzer account name.
- Resource
Group stringName - The name of the resource group. The name is case insensitive.
- Access
Policy stringName - The Access Policy name.
- Authentication
Jwt
Authentication Args - Authentication method to be used when validating client API access.
- Role
string | Access
Policy Role - Defines the access level granted by this policy.
- account
Name String - The Azure Video Analyzer account name.
- resource
Group StringName - The name of the resource group. The name is case insensitive.
- access
Policy StringName - The Access Policy name.
- authentication
Jwt
Authentication - Authentication method to be used when validating client API access.
- role
String | Access
Policy Role - Defines the access level granted by this policy.
- account
Name string - The Azure Video Analyzer account name.
- resource
Group stringName - The name of the resource group. The name is case insensitive.
- access
Policy stringName - The Access Policy name.
- authentication
Jwt
Authentication - Authentication method to be used when validating client API access.
- role
string | Access
Policy Role - Defines the access level granted by this policy.
- account_
name str - The Azure Video Analyzer account name.
- resource_
group_ strname - The name of the resource group. The name is case insensitive.
- access_
policy_ strname - The Access Policy name.
- authentication
Jwt
Authentication Args - Authentication method to be used when validating client API access.
- role
str | Access
Policy Role - Defines the access level granted by this policy.
- account
Name String - The Azure Video Analyzer account name.
- resource
Group StringName - The name of the resource group. The name is case insensitive.
- access
Policy StringName - The Access Policy name.
- authentication Property Map
- Authentication method to be used when validating client API access.
- role String | "Reader"
- Defines the access level granted by this policy.
Outputs
All input properties are implicitly available as output properties. Additionally, the AccessPolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The name of the resource
- System
Data Pulumi.Azure Native. Video Analyzer. Outputs. System Data Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The name of the resource
- System
Data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The name of the resource
- system
Data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id string
- The provider-assigned unique ID for this managed resource.
- name string
- The name of the resource
- system
Data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id str
- The provider-assigned unique ID for this managed resource.
- name str
- The name of the resource
- system_
data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type str
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The name of the resource
- system
Data Property Map - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
Supporting Types
AccessPolicyEccAlgo, AccessPolicyEccAlgoArgs
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- Access
Policy Ecc Algo ES256 - ES256ES265
- Access
Policy Ecc Algo ES384 - ES384ES384
- Access
Policy Ecc Algo ES512 - ES512ES512
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- "ES256"
- ES256ES265
- "ES384"
- ES384ES384
- "ES512"
- ES512ES512
AccessPolicyRole, AccessPolicyRoleArgs
- Reader
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- Access
Policy Role Reader - ReaderReader role allows for read-only operations to be performed through the client APIs.
- Reader
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- Reader
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- READER
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- "Reader"
- ReaderReader role allows for read-only operations to be performed through the client APIs.
AccessPolicyRsaAlgo, AccessPolicyRsaAlgoArgs
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- Access
Policy Rsa Algo RS256 - RS256RS256
- Access
Policy Rsa Algo RS384 - RS384RS384
- Access
Policy Rsa Algo RS512 - RS512RS512
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- "RS256"
- RS256RS256
- "RS384"
- RS384RS384
- "RS512"
- RS512RS512
EccTokenKey, EccTokenKeyArgs
- Alg
string | Pulumi.
Azure Native. Video Analyzer. Access Policy Ecc Algo - Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- X string
- X coordinate.
- Y string
- Y coordinate.
- Alg
string | Access
Policy Ecc Algo - Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- X string
- X coordinate.
- Y string
- Y coordinate.
- alg
String | Access
Policy Ecc Algo - Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x String
- X coordinate.
- y String
- Y coordinate.
- alg
string | Access
Policy Ecc Algo - Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x string
- X coordinate.
- y string
- Y coordinate.
- alg
str | Access
Policy Ecc Algo - Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid str
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x str
- X coordinate.
- y str
- Y coordinate.
- alg String | "ES256" | "ES384" | "ES512"
- Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x String
- X coordinate.
- y String
- Y coordinate.
EccTokenKeyResponse, EccTokenKeyResponseArgs
JwtAuthentication, JwtAuthenticationArgs
- Audiences List<string>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
List<Pulumi.
Azure Native. Video Analyzer. Inputs. Token Claim> - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers List<string>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys
List<Union<Pulumi.
Azure Native. Video Analyzer. Inputs. Ecc Token Key, Pulumi. Azure Native. Video Analyzer. Inputs. Rsa Token Key>> - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- Audiences []string
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
[]Token
Claim - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers []string
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys []interface{}
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
List<Token
Claim> - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
List<Either<Ecc
Token Key,Rsa Token Key>> - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences string[]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
Token
Claim[] - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers string[]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
(Ecc
Token Key | Rsa Token Key)[] - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences Sequence[str]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
Sequence[Token
Claim] - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers Sequence[str]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
Sequence[Union[Ecc
Token Key, Rsa Token Key]] - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims List<Property Map>
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys List<Property Map | Property Map>
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
JwtAuthenticationResponse, JwtAuthenticationResponseArgs
- Audiences List<string>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
List<Pulumi.
Azure Native. Video Analyzer. Inputs. Token Claim Response> - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers List<string>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys
List<Union<Pulumi.
Azure Native. Video Analyzer. Inputs. Ecc Token Key Response, Pulumi. Azure Native. Video Analyzer. Inputs. Rsa Token Key Response>> - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- Audiences []string
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
[]Token
Claim Response - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers []string
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys []interface{}
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
List<Token
Claim Response> - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
List<Either<Ecc
Token Key Response,Rsa Token Key Response>> - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences string[]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
Token
Claim Response[] - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers string[]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
(Ecc
Token Key Response | Rsa Token Key Response)[] - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences Sequence[str]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
Sequence[Token
Claim Response] - List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers Sequence[str]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
Sequence[Union[Ecc
Token Key Response, Rsa Token Key Response]] - List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims List<Property Map>
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys List<Property Map | Property Map>
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
RsaTokenKey, RsaTokenKeyArgs
- Alg
string | Pulumi.
Azure Native. Video Analyzer. Access Policy Rsa Algo - RSA algorithm to be used: RS256, RS384 or RS512.
- E string
- RSA public key exponent.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- N string
- RSA public key modulus.
- Alg
string | Access
Policy Rsa Algo - RSA algorithm to be used: RS256, RS384 or RS512.
- E string
- RSA public key exponent.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- N string
- RSA public key modulus.
- alg
String | Access
Policy Rsa Algo - RSA algorithm to be used: RS256, RS384 or RS512.
- e String
- RSA public key exponent.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n String
- RSA public key modulus.
- alg
string | Access
Policy Rsa Algo - RSA algorithm to be used: RS256, RS384 or RS512.
- e string
- RSA public key exponent.
- kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n string
- RSA public key modulus.
- alg
str | Access
Policy Rsa Algo - RSA algorithm to be used: RS256, RS384 or RS512.
- e str
- RSA public key exponent.
- kid str
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n str
- RSA public key modulus.
- alg String | "RS256" | "RS384" | "RS512"
- RSA algorithm to be used: RS256, RS384 or RS512.
- e String
- RSA public key exponent.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n String
- RSA public key modulus.
RsaTokenKeyResponse, RsaTokenKeyResponseArgs
SystemDataResponse, SystemDataResponseArgs
- Created
At string - The timestamp of resource creation (UTC).
- Created
By string - The identity that created the resource.
- Created
By stringType - The type of identity that created the resource.
- Last
Modified stringAt - The timestamp of resource last modification (UTC)
- Last
Modified stringBy - The identity that last modified the resource.
- Last
Modified stringBy Type - The type of identity that last modified the resource.
- Created
At string - The timestamp of resource creation (UTC).
- Created
By string - The identity that created the resource.
- Created
By stringType - The type of identity that created the resource.
- Last
Modified stringAt - The timestamp of resource last modification (UTC)
- Last
Modified stringBy - The identity that last modified the resource.
- Last
Modified stringBy Type - The type of identity that last modified the resource.
- created
At String - The timestamp of resource creation (UTC).
- created
By String - The identity that created the resource.
- created
By StringType - The type of identity that created the resource.
- last
Modified StringAt - The timestamp of resource last modification (UTC)
- last
Modified StringBy - The identity that last modified the resource.
- last
Modified StringBy Type - The type of identity that last modified the resource.
- created
At string - The timestamp of resource creation (UTC).
- created
By string - The identity that created the resource.
- created
By stringType - The type of identity that created the resource.
- last
Modified stringAt - The timestamp of resource last modification (UTC)
- last
Modified stringBy - The identity that last modified the resource.
- last
Modified stringBy Type - The type of identity that last modified the resource.
- created_
at str - The timestamp of resource creation (UTC).
- created_
by str - The identity that created the resource.
- created_
by_ strtype - The type of identity that created the resource.
- last_
modified_ strat - The timestamp of resource last modification (UTC)
- last_
modified_ strby - The identity that last modified the resource.
- last_
modified_ strby_ type - The type of identity that last modified the resource.
- created
At String - The timestamp of resource creation (UTC).
- created
By String - The identity that created the resource.
- created
By StringType - The type of identity that created the resource.
- last
Modified StringAt - The timestamp of resource last modification (UTC)
- last
Modified StringBy - The identity that last modified the resource.
- last
Modified StringBy Type - The type of identity that last modified the resource.
TokenClaim, TokenClaimArgs
TokenClaimResponse, TokenClaimResponseArgs
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:videoanalyzer:AccessPolicy accessPolicyName1 /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Media/videoAnalyzers/{accountName}/accessPolicies/{accessPolicyName}
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Native pulumi/pulumi-azure-native
- License
- Apache-2.0