gcp.applicationintegration.AuthConfig
Explore with Pulumi AI
The AuthConfig resource use to hold channels and connection config data.
To get more information about AuthConfig, see:
Example Usage
Integrations Auth Config Basic
import * as pulumi from "@pulumi/pulumi";
import * as gcp from "@pulumi/gcp";
const client = new gcp.applicationintegration.Client("client", {location: "us-west1"});
const basicExample = new gcp.applicationintegration.AuthConfig("basic_example", {
location: "us-west1",
displayName: "test-authconfig",
description: "Test auth config created via terraform",
decryptedCredential: {
credentialType: "USERNAME_AND_PASSWORD",
usernameAndPassword: {
username: "test-username",
password: "test-password",
},
},
}, {
dependsOn: [client],
});
import pulumi
import pulumi_gcp as gcp
client = gcp.applicationintegration.Client("client", location="us-west1")
basic_example = gcp.applicationintegration.AuthConfig("basic_example",
location="us-west1",
display_name="test-authconfig",
description="Test auth config created via terraform",
decrypted_credential={
"credential_type": "USERNAME_AND_PASSWORD",
"username_and_password": {
"username": "test-username",
"password": "test-password",
},
},
opts = pulumi.ResourceOptions(depends_on=[client]))
package main
import (
"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/applicationintegration"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
client, err := applicationintegration.NewClient(ctx, "client", &applicationintegration.ClientArgs{
Location: pulumi.String("us-west1"),
})
if err != nil {
return err
}
_, err = applicationintegration.NewAuthConfig(ctx, "basic_example", &applicationintegration.AuthConfigArgs{
Location: pulumi.String("us-west1"),
DisplayName: pulumi.String("test-authconfig"),
Description: pulumi.String("Test auth config created via terraform"),
DecryptedCredential: &applicationintegration.AuthConfigDecryptedCredentialArgs{
CredentialType: pulumi.String("USERNAME_AND_PASSWORD"),
UsernameAndPassword: &applicationintegration.AuthConfigDecryptedCredentialUsernameAndPasswordArgs{
Username: pulumi.String("test-username"),
Password: pulumi.String("test-password"),
},
},
}, pulumi.DependsOn([]pulumi.Resource{
client,
}))
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Gcp = Pulumi.Gcp;
return await Deployment.RunAsync(() =>
{
var client = new Gcp.ApplicationIntegration.Client("client", new()
{
Location = "us-west1",
});
var basicExample = new Gcp.ApplicationIntegration.AuthConfig("basic_example", new()
{
Location = "us-west1",
DisplayName = "test-authconfig",
Description = "Test auth config created via terraform",
DecryptedCredential = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialArgs
{
CredentialType = "USERNAME_AND_PASSWORD",
UsernameAndPassword = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialUsernameAndPasswordArgs
{
Username = "test-username",
Password = "test-password",
},
},
}, new CustomResourceOptions
{
DependsOn =
{
client,
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.applicationintegration.Client;
import com.pulumi.gcp.applicationintegration.ClientArgs;
import com.pulumi.gcp.applicationintegration.AuthConfig;
import com.pulumi.gcp.applicationintegration.AuthConfigArgs;
import com.pulumi.gcp.applicationintegration.inputs.AuthConfigDecryptedCredentialArgs;
import com.pulumi.gcp.applicationintegration.inputs.AuthConfigDecryptedCredentialUsernameAndPasswordArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var client = new Client("client", ClientArgs.builder()
.location("us-west1")
.build());
var basicExample = new AuthConfig("basicExample", AuthConfigArgs.builder()
.location("us-west1")
.displayName("test-authconfig")
.description("Test auth config created via terraform")
.decryptedCredential(AuthConfigDecryptedCredentialArgs.builder()
.credentialType("USERNAME_AND_PASSWORD")
.usernameAndPassword(AuthConfigDecryptedCredentialUsernameAndPasswordArgs.builder()
.username("test-username")
.password("test-password")
.build())
.build())
.build(), CustomResourceOptions.builder()
.dependsOn(client)
.build());
}
}
resources:
client:
type: gcp:applicationintegration:Client
properties:
location: us-west1
basicExample:
type: gcp:applicationintegration:AuthConfig
name: basic_example
properties:
location: us-west1
displayName: test-authconfig
description: Test auth config created via terraform
decryptedCredential:
credentialType: USERNAME_AND_PASSWORD
usernameAndPassword:
username: test-username
password: test-password
options:
dependson:
- ${client}
Create AuthConfig Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AuthConfig(name: string, args: AuthConfigArgs, opts?: CustomResourceOptions);
@overload
def AuthConfig(resource_name: str,
args: AuthConfigArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AuthConfig(resource_name: str,
opts: Optional[ResourceOptions] = None,
display_name: Optional[str] = None,
location: Optional[str] = None,
client_certificate: Optional[AuthConfigClientCertificateArgs] = None,
decrypted_credential: Optional[AuthConfigDecryptedCredentialArgs] = None,
description: Optional[str] = None,
expiry_notification_durations: Optional[Sequence[str]] = None,
override_valid_time: Optional[str] = None,
project: Optional[str] = None,
visibility: Optional[str] = None)
func NewAuthConfig(ctx *Context, name string, args AuthConfigArgs, opts ...ResourceOption) (*AuthConfig, error)
public AuthConfig(string name, AuthConfigArgs args, CustomResourceOptions? opts = null)
public AuthConfig(String name, AuthConfigArgs args)
public AuthConfig(String name, AuthConfigArgs args, CustomResourceOptions options)
type: gcp:applicationintegration:AuthConfig
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AuthConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AuthConfigArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AuthConfigArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AuthConfigArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AuthConfigArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var authConfigResource = new Gcp.ApplicationIntegration.AuthConfig("authConfigResource", new()
{
DisplayName = "string",
Location = "string",
ClientCertificate = new Gcp.ApplicationIntegration.Inputs.AuthConfigClientCertificateArgs
{
EncryptedPrivateKey = "string",
SslCertificate = "string",
Passphrase = "string",
},
DecryptedCredential = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialArgs
{
CredentialType = "string",
AuthToken = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialAuthTokenArgs
{
Token = "string",
Type = "string",
},
Jwt = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialJwtArgs
{
Jwt = "string",
JwtHeader = "string",
JwtPayload = "string",
Secret = "string",
},
Oauth2AuthorizationCode = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2AuthorizationCodeArgs
{
AuthEndpoint = "string",
ClientId = "string",
ClientSecret = "string",
Scope = "string",
TokenEndpoint = "string",
},
Oauth2ClientCredentials = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsArgs
{
ClientId = "string",
ClientSecret = "string",
RequestType = "string",
Scope = "string",
TokenEndpoint = "string",
TokenParams = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsArgs
{
Entries = new[]
{
new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryArgs
{
Key = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyArgs
{
LiteralValue = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValueArgs
{
StringValue = "string",
},
},
Value = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueArgs
{
LiteralValue = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValueArgs
{
StringValue = "string",
},
},
},
},
},
},
OidcToken = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialOidcTokenArgs
{
Audience = "string",
ServiceAccountEmail = "string",
Token = "string",
TokenExpireTime = "string",
},
ServiceAccountCredentials = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialServiceAccountCredentialsArgs
{
Scope = "string",
ServiceAccount = "string",
},
UsernameAndPassword = new Gcp.ApplicationIntegration.Inputs.AuthConfigDecryptedCredentialUsernameAndPasswordArgs
{
Password = "string",
Username = "string",
},
},
Description = "string",
ExpiryNotificationDurations = new[]
{
"string",
},
OverrideValidTime = "string",
Project = "string",
Visibility = "string",
});
example, err := applicationintegration.NewAuthConfig(ctx, "authConfigResource", &applicationintegration.AuthConfigArgs{
DisplayName: pulumi.String("string"),
Location: pulumi.String("string"),
ClientCertificate: &applicationintegration.AuthConfigClientCertificateArgs{
EncryptedPrivateKey: pulumi.String("string"),
SslCertificate: pulumi.String("string"),
Passphrase: pulumi.String("string"),
},
DecryptedCredential: &applicationintegration.AuthConfigDecryptedCredentialArgs{
CredentialType: pulumi.String("string"),
AuthToken: &applicationintegration.AuthConfigDecryptedCredentialAuthTokenArgs{
Token: pulumi.String("string"),
Type: pulumi.String("string"),
},
Jwt: &applicationintegration.AuthConfigDecryptedCredentialJwtArgs{
Jwt: pulumi.String("string"),
JwtHeader: pulumi.String("string"),
JwtPayload: pulumi.String("string"),
Secret: pulumi.String("string"),
},
Oauth2AuthorizationCode: &applicationintegration.AuthConfigDecryptedCredentialOauth2AuthorizationCodeArgs{
AuthEndpoint: pulumi.String("string"),
ClientId: pulumi.String("string"),
ClientSecret: pulumi.String("string"),
Scope: pulumi.String("string"),
TokenEndpoint: pulumi.String("string"),
},
Oauth2ClientCredentials: &applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsArgs{
ClientId: pulumi.String("string"),
ClientSecret: pulumi.String("string"),
RequestType: pulumi.String("string"),
Scope: pulumi.String("string"),
TokenEndpoint: pulumi.String("string"),
TokenParams: &applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsArgs{
Entries: applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryArray{
&applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryArgs{
Key: &applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyArgs{
LiteralValue: &applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValueArgs{
StringValue: pulumi.String("string"),
},
},
Value: &applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueArgs{
LiteralValue: &applicationintegration.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValueArgs{
StringValue: pulumi.String("string"),
},
},
},
},
},
},
OidcToken: &applicationintegration.AuthConfigDecryptedCredentialOidcTokenArgs{
Audience: pulumi.String("string"),
ServiceAccountEmail: pulumi.String("string"),
Token: pulumi.String("string"),
TokenExpireTime: pulumi.String("string"),
},
ServiceAccountCredentials: &applicationintegration.AuthConfigDecryptedCredentialServiceAccountCredentialsArgs{
Scope: pulumi.String("string"),
ServiceAccount: pulumi.String("string"),
},
UsernameAndPassword: &applicationintegration.AuthConfigDecryptedCredentialUsernameAndPasswordArgs{
Password: pulumi.String("string"),
Username: pulumi.String("string"),
},
},
Description: pulumi.String("string"),
ExpiryNotificationDurations: pulumi.StringArray{
pulumi.String("string"),
},
OverrideValidTime: pulumi.String("string"),
Project: pulumi.String("string"),
Visibility: pulumi.String("string"),
})
var authConfigResource = new AuthConfig("authConfigResource", AuthConfigArgs.builder()
.displayName("string")
.location("string")
.clientCertificate(AuthConfigClientCertificateArgs.builder()
.encryptedPrivateKey("string")
.sslCertificate("string")
.passphrase("string")
.build())
.decryptedCredential(AuthConfigDecryptedCredentialArgs.builder()
.credentialType("string")
.authToken(AuthConfigDecryptedCredentialAuthTokenArgs.builder()
.token("string")
.type("string")
.build())
.jwt(AuthConfigDecryptedCredentialJwtArgs.builder()
.jwt("string")
.jwtHeader("string")
.jwtPayload("string")
.secret("string")
.build())
.oauth2AuthorizationCode(AuthConfigDecryptedCredentialOauth2AuthorizationCodeArgs.builder()
.authEndpoint("string")
.clientId("string")
.clientSecret("string")
.scope("string")
.tokenEndpoint("string")
.build())
.oauth2ClientCredentials(AuthConfigDecryptedCredentialOauth2ClientCredentialsArgs.builder()
.clientId("string")
.clientSecret("string")
.requestType("string")
.scope("string")
.tokenEndpoint("string")
.tokenParams(AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsArgs.builder()
.entries(AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryArgs.builder()
.key(AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyArgs.builder()
.literalValue(AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValueArgs.builder()
.stringValue("string")
.build())
.build())
.value(AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueArgs.builder()
.literalValue(AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValueArgs.builder()
.stringValue("string")
.build())
.build())
.build())
.build())
.build())
.oidcToken(AuthConfigDecryptedCredentialOidcTokenArgs.builder()
.audience("string")
.serviceAccountEmail("string")
.token("string")
.tokenExpireTime("string")
.build())
.serviceAccountCredentials(AuthConfigDecryptedCredentialServiceAccountCredentialsArgs.builder()
.scope("string")
.serviceAccount("string")
.build())
.usernameAndPassword(AuthConfigDecryptedCredentialUsernameAndPasswordArgs.builder()
.password("string")
.username("string")
.build())
.build())
.description("string")
.expiryNotificationDurations("string")
.overrideValidTime("string")
.project("string")
.visibility("string")
.build());
auth_config_resource = gcp.applicationintegration.AuthConfig("authConfigResource",
display_name="string",
location="string",
client_certificate={
"encrypted_private_key": "string",
"ssl_certificate": "string",
"passphrase": "string",
},
decrypted_credential={
"credential_type": "string",
"auth_token": {
"token": "string",
"type": "string",
},
"jwt": {
"jwt": "string",
"jwt_header": "string",
"jwt_payload": "string",
"secret": "string",
},
"oauth2_authorization_code": {
"auth_endpoint": "string",
"client_id": "string",
"client_secret": "string",
"scope": "string",
"token_endpoint": "string",
},
"oauth2_client_credentials": {
"client_id": "string",
"client_secret": "string",
"request_type": "string",
"scope": "string",
"token_endpoint": "string",
"token_params": {
"entries": [{
"key": {
"literal_value": {
"string_value": "string",
},
},
"value": {
"literal_value": {
"string_value": "string",
},
},
}],
},
},
"oidc_token": {
"audience": "string",
"service_account_email": "string",
"token": "string",
"token_expire_time": "string",
},
"service_account_credentials": {
"scope": "string",
"service_account": "string",
},
"username_and_password": {
"password": "string",
"username": "string",
},
},
description="string",
expiry_notification_durations=["string"],
override_valid_time="string",
project="string",
visibility="string")
const authConfigResource = new gcp.applicationintegration.AuthConfig("authConfigResource", {
displayName: "string",
location: "string",
clientCertificate: {
encryptedPrivateKey: "string",
sslCertificate: "string",
passphrase: "string",
},
decryptedCredential: {
credentialType: "string",
authToken: {
token: "string",
type: "string",
},
jwt: {
jwt: "string",
jwtHeader: "string",
jwtPayload: "string",
secret: "string",
},
oauth2AuthorizationCode: {
authEndpoint: "string",
clientId: "string",
clientSecret: "string",
scope: "string",
tokenEndpoint: "string",
},
oauth2ClientCredentials: {
clientId: "string",
clientSecret: "string",
requestType: "string",
scope: "string",
tokenEndpoint: "string",
tokenParams: {
entries: [{
key: {
literalValue: {
stringValue: "string",
},
},
value: {
literalValue: {
stringValue: "string",
},
},
}],
},
},
oidcToken: {
audience: "string",
serviceAccountEmail: "string",
token: "string",
tokenExpireTime: "string",
},
serviceAccountCredentials: {
scope: "string",
serviceAccount: "string",
},
usernameAndPassword: {
password: "string",
username: "string",
},
},
description: "string",
expiryNotificationDurations: ["string"],
overrideValidTime: "string",
project: "string",
visibility: "string",
});
type: gcp:applicationintegration:AuthConfig
properties:
clientCertificate:
encryptedPrivateKey: string
passphrase: string
sslCertificate: string
decryptedCredential:
authToken:
token: string
type: string
credentialType: string
jwt:
jwt: string
jwtHeader: string
jwtPayload: string
secret: string
oauth2AuthorizationCode:
authEndpoint: string
clientId: string
clientSecret: string
scope: string
tokenEndpoint: string
oauth2ClientCredentials:
clientId: string
clientSecret: string
requestType: string
scope: string
tokenEndpoint: string
tokenParams:
entries:
- key:
literalValue:
stringValue: string
value:
literalValue:
stringValue: string
oidcToken:
audience: string
serviceAccountEmail: string
token: string
tokenExpireTime: string
serviceAccountCredentials:
scope: string
serviceAccount: string
usernameAndPassword:
password: string
username: string
description: string
displayName: string
expiryNotificationDurations:
- string
location: string
overrideValidTime: string
project: string
visibility: string
AuthConfig Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AuthConfig resource accepts the following input properties:
- Display
Name string - The name of the auth config.
- Location string
- Location in which client needs to be provisioned.
- Client
Certificate AuthConfig Client Certificate - Raw client certificate Structure is documented below.
- Decrypted
Credential AuthConfig Decrypted Credential - Raw auth credentials. Structure is documented below.
- Description string
- A description of the auth config.
- Expiry
Notification List<string>Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- Override
Valid stringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Visibility string
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- Display
Name string - The name of the auth config.
- Location string
- Location in which client needs to be provisioned.
- Client
Certificate AuthConfig Client Certificate Args - Raw client certificate Structure is documented below.
- Decrypted
Credential AuthConfig Decrypted Credential Args - Raw auth credentials. Structure is documented below.
- Description string
- A description of the auth config.
- Expiry
Notification []stringDurations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- Override
Valid stringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Visibility string
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- display
Name String - The name of the auth config.
- location String
- Location in which client needs to be provisioned.
- client
Certificate AuthConfig Client Certificate - Raw client certificate Structure is documented below.
- decrypted
Credential AuthConfig Decrypted Credential - Raw auth credentials. Structure is documented below.
- description String
- A description of the auth config.
- expiry
Notification List<String>Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- override
Valid StringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- visibility String
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- display
Name string - The name of the auth config.
- location string
- Location in which client needs to be provisioned.
- client
Certificate AuthConfig Client Certificate - Raw client certificate Structure is documented below.
- decrypted
Credential AuthConfig Decrypted Credential - Raw auth credentials. Structure is documented below.
- description string
- A description of the auth config.
- expiry
Notification string[]Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- override
Valid stringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- visibility string
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- display_
name str - The name of the auth config.
- location str
- Location in which client needs to be provisioned.
- client_
certificate AuthConfig Client Certificate Args - Raw client certificate Structure is documented below.
- decrypted_
credential AuthConfig Decrypted Credential Args - Raw auth credentials. Structure is documented below.
- description str
- A description of the auth config.
- expiry_
notification_ Sequence[str]durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- override_
valid_ strtime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project str
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- visibility str
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- display
Name String - The name of the auth config.
- location String
- Location in which client needs to be provisioned.
- client
Certificate Property Map - Raw client certificate Structure is documented below.
- decrypted
Credential Property Map - Raw auth credentials. Structure is documented below.
- description String
- A description of the auth config.
- expiry
Notification List<String>Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- override
Valid StringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- visibility String
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
Outputs
All input properties are implicitly available as output properties. Additionally, the AuthConfig resource produces the following output properties:
- Certificate
Id string - Certificate id for client certificate.
- Create
Time string - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Creator
Email string - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Credential
Type string - Credential type of the encrypted credential.
- Encrypted
Credential string - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Modifier stringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Name string
- Resource name of the auth config.
- Reason string
- The reason / details of the current status.
- State string
- The status of the auth config.
- Update
Time string - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Valid
Time string - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Certificate
Id string - Certificate id for client certificate.
- Create
Time string - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Creator
Email string - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Credential
Type string - Credential type of the encrypted credential.
- Encrypted
Credential string - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Modifier stringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Name string
- Resource name of the auth config.
- Reason string
- The reason / details of the current status.
- State string
- The status of the auth config.
- Update
Time string - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Valid
Time string - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- certificate
Id String - Certificate id for client certificate.
- create
Time String - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator
Email String - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential
Type String - Credential type of the encrypted credential.
- encrypted
Credential String - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- id String
- The provider-assigned unique ID for this managed resource.
- last
Modifier StringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- name String
- Resource name of the auth config.
- reason String
- The reason / details of the current status.
- state String
- The status of the auth config.
- update
Time String - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid
Time String - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- certificate
Id string - Certificate id for client certificate.
- create
Time string - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator
Email string - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential
Type string - Credential type of the encrypted credential.
- encrypted
Credential string - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- id string
- The provider-assigned unique ID for this managed resource.
- last
Modifier stringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- name string
- Resource name of the auth config.
- reason string
- The reason / details of the current status.
- state string
- The status of the auth config.
- update
Time string - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid
Time string - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- certificate_
id str - Certificate id for client certificate.
- create_
time str - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator_
email str - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential_
type str - Credential type of the encrypted credential.
- encrypted_
credential str - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- id str
- The provider-assigned unique ID for this managed resource.
- last_
modifier_ stremail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- name str
- Resource name of the auth config.
- reason str
- The reason / details of the current status.
- state str
- The status of the auth config.
- update_
time str - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid_
time str - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- certificate
Id String - Certificate id for client certificate.
- create
Time String - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator
Email String - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential
Type String - Credential type of the encrypted credential.
- encrypted
Credential String - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- id String
- The provider-assigned unique ID for this managed resource.
- last
Modifier StringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- name String
- Resource name of the auth config.
- reason String
- The reason / details of the current status.
- state String
- The status of the auth config.
- update
Time String - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid
Time String - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
Look up Existing AuthConfig Resource
Get an existing AuthConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AuthConfigState, opts?: CustomResourceOptions): AuthConfig
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
certificate_id: Optional[str] = None,
client_certificate: Optional[AuthConfigClientCertificateArgs] = None,
create_time: Optional[str] = None,
creator_email: Optional[str] = None,
credential_type: Optional[str] = None,
decrypted_credential: Optional[AuthConfigDecryptedCredentialArgs] = None,
description: Optional[str] = None,
display_name: Optional[str] = None,
encrypted_credential: Optional[str] = None,
expiry_notification_durations: Optional[Sequence[str]] = None,
last_modifier_email: Optional[str] = None,
location: Optional[str] = None,
name: Optional[str] = None,
override_valid_time: Optional[str] = None,
project: Optional[str] = None,
reason: Optional[str] = None,
state: Optional[str] = None,
update_time: Optional[str] = None,
valid_time: Optional[str] = None,
visibility: Optional[str] = None) -> AuthConfig
func GetAuthConfig(ctx *Context, name string, id IDInput, state *AuthConfigState, opts ...ResourceOption) (*AuthConfig, error)
public static AuthConfig Get(string name, Input<string> id, AuthConfigState? state, CustomResourceOptions? opts = null)
public static AuthConfig get(String name, Output<String> id, AuthConfigState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Certificate
Id string - Certificate id for client certificate.
- Client
Certificate AuthConfig Client Certificate - Raw client certificate Structure is documented below.
- Create
Time string - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Creator
Email string - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Credential
Type string - Credential type of the encrypted credential.
- Decrypted
Credential AuthConfig Decrypted Credential - Raw auth credentials. Structure is documented below.
- Description string
- A description of the auth config.
- Display
Name string - The name of the auth config.
- Encrypted
Credential string - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- Expiry
Notification List<string>Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- Last
Modifier stringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Location string
- Location in which client needs to be provisioned.
- Name string
- Resource name of the auth config.
- Override
Valid stringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Reason string
- The reason / details of the current status.
- State string
- The status of the auth config.
- Update
Time string - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Valid
Time string - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Visibility string
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- Certificate
Id string - Certificate id for client certificate.
- Client
Certificate AuthConfig Client Certificate Args - Raw client certificate Structure is documented below.
- Create
Time string - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Creator
Email string - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Credential
Type string - Credential type of the encrypted credential.
- Decrypted
Credential AuthConfig Decrypted Credential Args - Raw auth credentials. Structure is documented below.
- Description string
- A description of the auth config.
- Display
Name string - The name of the auth config.
- Encrypted
Credential string - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- Expiry
Notification []stringDurations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- Last
Modifier stringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- Location string
- Location in which client needs to be provisioned.
- Name string
- Resource name of the auth config.
- Override
Valid stringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- Reason string
- The reason / details of the current status.
- State string
- The status of the auth config.
- Update
Time string - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Valid
Time string - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Visibility string
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- certificate
Id String - Certificate id for client certificate.
- client
Certificate AuthConfig Client Certificate - Raw client certificate Structure is documented below.
- create
Time String - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator
Email String - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential
Type String - Credential type of the encrypted credential.
- decrypted
Credential AuthConfig Decrypted Credential - Raw auth credentials. Structure is documented below.
- description String
- A description of the auth config.
- display
Name String - The name of the auth config.
- encrypted
Credential String - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- expiry
Notification List<String>Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- last
Modifier StringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- location String
- Location in which client needs to be provisioned.
- name String
- Resource name of the auth config.
- override
Valid StringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- reason String
- The reason / details of the current status.
- state String
- The status of the auth config.
- update
Time String - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid
Time String - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- visibility String
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- certificate
Id string - Certificate id for client certificate.
- client
Certificate AuthConfig Client Certificate - Raw client certificate Structure is documented below.
- create
Time string - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator
Email string - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential
Type string - Credential type of the encrypted credential.
- decrypted
Credential AuthConfig Decrypted Credential - Raw auth credentials. Structure is documented below.
- description string
- A description of the auth config.
- display
Name string - The name of the auth config.
- encrypted
Credential string - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- expiry
Notification string[]Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- last
Modifier stringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- location string
- Location in which client needs to be provisioned.
- name string
- Resource name of the auth config.
- override
Valid stringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project string
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- reason string
- The reason / details of the current status.
- state string
- The status of the auth config.
- update
Time string - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid
Time string - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- visibility string
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- certificate_
id str - Certificate id for client certificate.
- client_
certificate AuthConfig Client Certificate Args - Raw client certificate Structure is documented below.
- create_
time str - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator_
email str - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential_
type str - Credential type of the encrypted credential.
- decrypted_
credential AuthConfig Decrypted Credential Args - Raw auth credentials. Structure is documented below.
- description str
- A description of the auth config.
- display_
name str - The name of the auth config.
- encrypted_
credential str - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- expiry_
notification_ Sequence[str]durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- last_
modifier_ stremail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- location str
- Location in which client needs to be provisioned.
- name str
- Resource name of the auth config.
- override_
valid_ strtime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project str
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- reason str
- The reason / details of the current status.
- state str
- The status of the auth config.
- update_
time str - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid_
time str - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- visibility str
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
- certificate
Id String - Certificate id for client certificate.
- client
Certificate Property Map - Raw client certificate Structure is documented below.
- create
Time String - The timestamp when the auth config is created. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- creator
Email String - The creator's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- credential
Type String - Credential type of the encrypted credential.
- decrypted
Credential Property Map - Raw auth credentials. Structure is documented below.
- description String
- A description of the auth config.
- display
Name String - The name of the auth config.
- encrypted
Credential String - Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key. A base64-encoded string.
- expiry
Notification List<String>Durations - User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours. A duration in seconds with up to nine fractional digits, ending with 's'. Example: "3.5s".
- last
Modifier StringEmail - The last modifier's email address. Generated based on the End User Credentials/LOAS role of the user making the call.
- location String
- Location in which client needs to be provisioned.
- name String
- Resource name of the auth config.
- override
Valid StringTime - User provided expiry time to override. For the example of Salesforce, username/password credentials can be valid for 6 months depending on the instance settings. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- project String
- The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
- reason String
- The reason / details of the current status.
- state String
- The status of the auth config.
- update
Time String - The timestamp when the auth config is modified. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- valid
Time String - The time until the auth config is valid. Empty or max value is considered the auth config won't expire. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- visibility String
- The visibility of the auth config.
Possible values are:
PRIVATE
,CLIENT_VISIBLE
.
Supporting Types
AuthConfigClientCertificate, AuthConfigClientCertificateArgs
- Encrypted
Private stringKey - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- Ssl
Certificate string - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- Passphrase string
- 'passphrase' should be left unset if private key is not encrypted. Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
- Encrypted
Private stringKey - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- Ssl
Certificate string - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- Passphrase string
- 'passphrase' should be left unset if private key is not encrypted. Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
- encrypted
Private StringKey - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- ssl
Certificate String - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- passphrase String
- 'passphrase' should be left unset if private key is not encrypted. Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
- encrypted
Private stringKey - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- ssl
Certificate string - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- passphrase string
- 'passphrase' should be left unset if private key is not encrypted. Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
- encrypted_
private_ strkey - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- ssl_
certificate str - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- passphrase str
- 'passphrase' should be left unset if private key is not encrypted. Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
- encrypted
Private StringKey - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- ssl
Certificate String - The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
- passphrase String
- 'passphrase' should be left unset if private key is not encrypted. Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
AuthConfigDecryptedCredential, AuthConfigDecryptedCredentialArgs
- Credential
Type string - Credential type associated with auth configs.
- Auth
Token AuthConfig Decrypted Credential Auth Token - Auth token credential. Structure is documented below.
- Jwt
Auth
Config Decrypted Credential Jwt - JWT credential. Structure is documented below.
- Auth
Config Decrypted Credential Oauth2Authorization Code - OAuth2 authorization code credential. Structure is documented below.
- Oauth2Client
Credentials AuthConfig Decrypted Credential Oauth2Client Credentials - OAuth2 client credentials. Structure is documented below.
- Oidc
Token AuthConfig Decrypted Credential Oidc Token - Google OIDC ID Token. Structure is documented below.
- Service
Account AuthCredentials Config Decrypted Credential Service Account Credentials - Service account credential. Structure is documented below.
- Username
And AuthPassword Config Decrypted Credential Username And Password - Username and password credential. Structure is documented below.
- Credential
Type string - Credential type associated with auth configs.
- Auth
Token AuthConfig Decrypted Credential Auth Token - Auth token credential. Structure is documented below.
- Jwt
Auth
Config Decrypted Credential Jwt - JWT credential. Structure is documented below.
- Auth
Config Decrypted Credential Oauth2Authorization Code - OAuth2 authorization code credential. Structure is documented below.
- Oauth2Client
Credentials AuthConfig Decrypted Credential Oauth2Client Credentials - OAuth2 client credentials. Structure is documented below.
- Oidc
Token AuthConfig Decrypted Credential Oidc Token - Google OIDC ID Token. Structure is documented below.
- Service
Account AuthCredentials Config Decrypted Credential Service Account Credentials - Service account credential. Structure is documented below.
- Username
And AuthPassword Config Decrypted Credential Username And Password - Username and password credential. Structure is documented below.
- credential
Type String - Credential type associated with auth configs.
- auth
Token AuthConfig Decrypted Credential Auth Token - Auth token credential. Structure is documented below.
- jwt
Auth
Config Decrypted Credential Jwt - JWT credential. Structure is documented below.
- Auth
Config Decrypted Credential Oauth2Authorization Code - OAuth2 authorization code credential. Structure is documented below.
- oauth2Client
Credentials AuthConfig Decrypted Credential Oauth2Client Credentials - OAuth2 client credentials. Structure is documented below.
- oidc
Token AuthConfig Decrypted Credential Oidc Token - Google OIDC ID Token. Structure is documented below.
- service
Account AuthCredentials Config Decrypted Credential Service Account Credentials - Service account credential. Structure is documented below.
- username
And AuthPassword Config Decrypted Credential Username And Password - Username and password credential. Structure is documented below.
- credential
Type string - Credential type associated with auth configs.
- auth
Token AuthConfig Decrypted Credential Auth Token - Auth token credential. Structure is documented below.
- jwt
Auth
Config Decrypted Credential Jwt - JWT credential. Structure is documented below.
- Auth
Config Decrypted Credential Oauth2Authorization Code - OAuth2 authorization code credential. Structure is documented below.
- oauth2Client
Credentials AuthConfig Decrypted Credential Oauth2Client Credentials - OAuth2 client credentials. Structure is documented below.
- oidc
Token AuthConfig Decrypted Credential Oidc Token - Google OIDC ID Token. Structure is documented below.
- service
Account AuthCredentials Config Decrypted Credential Service Account Credentials - Service account credential. Structure is documented below.
- username
And AuthPassword Config Decrypted Credential Username And Password - Username and password credential. Structure is documented below.
- credential_
type str - Credential type associated with auth configs.
- auth_
token AuthConfig Decrypted Credential Auth Token - Auth token credential. Structure is documented below.
- jwt
Auth
Config Decrypted Credential Jwt - JWT credential. Structure is documented below.
- Auth
Config Decrypted Credential Oauth2Authorization Code - OAuth2 authorization code credential. Structure is documented below.
- oauth2_
client_ Authcredentials Config Decrypted Credential Oauth2Client Credentials - OAuth2 client credentials. Structure is documented below.
- oidc_
token AuthConfig Decrypted Credential Oidc Token - Google OIDC ID Token. Structure is documented below.
- service_
account_ Authcredentials Config Decrypted Credential Service Account Credentials - Service account credential. Structure is documented below.
- username_
and_ Authpassword Config Decrypted Credential Username And Password - Username and password credential. Structure is documented below.
- credential
Type String - Credential type associated with auth configs.
- auth
Token Property Map - Auth token credential. Structure is documented below.
- jwt Property Map
- JWT credential. Structure is documented below.
- Property Map
- OAuth2 authorization code credential. Structure is documented below.
- oauth2Client
Credentials Property Map - OAuth2 client credentials. Structure is documented below.
- oidc
Token Property Map - Google OIDC ID Token. Structure is documented below.
- service
Account Property MapCredentials - Service account credential. Structure is documented below.
- username
And Property MapPassword - Username and password credential. Structure is documented below.
AuthConfigDecryptedCredentialAuthToken, AuthConfigDecryptedCredentialAuthTokenArgs
AuthConfigDecryptedCredentialJwt, AuthConfigDecryptedCredentialJwtArgs
- Jwt string
- (Output) The token calculated by the header, payload and signature.
- Jwt
Header string - Identifies which algorithm is used to generate the signature.
- Jwt
Payload string - Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
- Secret string
- User's pre-shared secret to sign the token.
- Jwt string
- (Output) The token calculated by the header, payload and signature.
- Jwt
Header string - Identifies which algorithm is used to generate the signature.
- Jwt
Payload string - Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
- Secret string
- User's pre-shared secret to sign the token.
- jwt String
- (Output) The token calculated by the header, payload and signature.
- jwt
Header String - Identifies which algorithm is used to generate the signature.
- jwt
Payload String - Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
- secret String
- User's pre-shared secret to sign the token.
- jwt string
- (Output) The token calculated by the header, payload and signature.
- jwt
Header string - Identifies which algorithm is used to generate the signature.
- jwt
Payload string - Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
- secret string
- User's pre-shared secret to sign the token.
- jwt str
- (Output) The token calculated by the header, payload and signature.
- jwt_
header str - Identifies which algorithm is used to generate the signature.
- jwt_
payload str - Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
- secret str
- User's pre-shared secret to sign the token.
- jwt String
- (Output) The token calculated by the header, payload and signature.
- jwt
Header String - Identifies which algorithm is used to generate the signature.
- jwt
Payload String - Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
- secret String
- User's pre-shared secret to sign the token.
AuthConfigDecryptedCredentialOauth2AuthorizationCode, AuthConfigDecryptedCredentialOauth2AuthorizationCodeArgs
- Auth
Endpoint string - The auth url endpoint to send the auth code request to.
- Client
Id string - The client's id.
- Client
Secret string - The client's secret.
- Scope string
- A space-delimited list of requested scope permissions.
- Token
Endpoint string - The token url endpoint to send the token request to.
- Auth
Endpoint string - The auth url endpoint to send the auth code request to.
- Client
Id string - The client's id.
- Client
Secret string - The client's secret.
- Scope string
- A space-delimited list of requested scope permissions.
- Token
Endpoint string - The token url endpoint to send the token request to.
- auth
Endpoint String - The auth url endpoint to send the auth code request to.
- client
Id String - The client's id.
- client
Secret String - The client's secret.
- scope String
- A space-delimited list of requested scope permissions.
- token
Endpoint String - The token url endpoint to send the token request to.
- auth
Endpoint string - The auth url endpoint to send the auth code request to.
- client
Id string - The client's id.
- client
Secret string - The client's secret.
- scope string
- A space-delimited list of requested scope permissions.
- token
Endpoint string - The token url endpoint to send the token request to.
- auth_
endpoint str - The auth url endpoint to send the auth code request to.
- client_
id str - The client's id.
- client_
secret str - The client's secret.
- scope str
- A space-delimited list of requested scope permissions.
- token_
endpoint str - The token url endpoint to send the token request to.
- auth
Endpoint String - The auth url endpoint to send the auth code request to.
- client
Id String - The client's id.
- client
Secret String - The client's secret.
- scope String
- A space-delimited list of requested scope permissions.
- token
Endpoint String - The token url endpoint to send the token request to.
AuthConfigDecryptedCredentialOauth2ClientCredentials, AuthConfigDecryptedCredentialOauth2ClientCredentialsArgs
- Client
Id string - The client's ID.
- Client
Secret string - The client's secret.
- Request
Type string - Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
- Scope string
- A space-delimited list of requested scope permissions.
- Token
Endpoint string - The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
- Token
Params AuthConfig Decrypted Credential Oauth2Client Credentials Token Params - Token parameters for the auth request.
- Client
Id string - The client's ID.
- Client
Secret string - The client's secret.
- Request
Type string - Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
- Scope string
- A space-delimited list of requested scope permissions.
- Token
Endpoint string - The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
- Token
Params AuthConfig Decrypted Credential Oauth2Client Credentials Token Params - Token parameters for the auth request.
- client
Id String - The client's ID.
- client
Secret String - The client's secret.
- request
Type String - Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
- scope String
- A space-delimited list of requested scope permissions.
- token
Endpoint String - The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
- token
Params AuthConfig Decrypted Credential Oauth2Client Credentials Token Params - Token parameters for the auth request.
- client
Id string - The client's ID.
- client
Secret string - The client's secret.
- request
Type string - Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
- scope string
- A space-delimited list of requested scope permissions.
- token
Endpoint string - The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
- token
Params AuthConfig Decrypted Credential Oauth2Client Credentials Token Params - Token parameters for the auth request.
- client_
id str - The client's ID.
- client_
secret str - The client's secret.
- request_
type str - Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
- scope str
- A space-delimited list of requested scope permissions.
- token_
endpoint str - The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
- token_
params AuthConfig Decrypted Credential Oauth2Client Credentials Token Params - Token parameters for the auth request.
- client
Id String - The client's ID.
- client
Secret String - The client's secret.
- request
Type String - Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
- scope String
- A space-delimited list of requested scope permissions.
- token
Endpoint String - The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
- token
Params Property Map - Token parameters for the auth request.
AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParams, AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsArgs
- Entries
List<Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry> - A list of parameter map entries. Structure is documented below.
- Entries
[]Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry - A list of parameter map entries. Structure is documented below.
- entries
List<Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry> - A list of parameter map entries. Structure is documented below.
- entries
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry[] - A list of parameter map entries. Structure is documented below.
- entries
Sequence[Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry] - A list of parameter map entries. Structure is documented below.
- entries List<Property Map>
- A list of parameter map entries. Structure is documented below.
AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntry, AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryArgs
- Key
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Key - Key of the map entry. Structure is documented below.
- Value
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Value - Value of the map entry. Structure is documented below.
- Key
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Key - Key of the map entry. Structure is documented below.
- Value
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Value - Value of the map entry. Structure is documented below.
- key
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Key - Key of the map entry. Structure is documented below.
- value
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Value - Value of the map entry. Structure is documented below.
- key
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Key - Key of the map entry. Structure is documented below.
- value
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Value - Value of the map entry. Structure is documented below.
- key
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Key - Key of the map entry. Structure is documented below.
- value
Auth
Config Decrypted Credential Oauth2Client Credentials Token Params Entry Value - Value of the map entry. Structure is documented below.
- key Property Map
- Key of the map entry. Structure is documented below.
- value Property Map
- Value of the map entry. Structure is documented below.
AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey, AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyArgs
- Literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Key Literal Value - Passing a literal value Structure is documented below.
- Literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Key Literal Value - Passing a literal value Structure is documented below.
- literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Key Literal Value - Passing a literal value Structure is documented below.
- literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Key Literal Value - Passing a literal value Structure is documented below.
- literal_
value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Key Literal Value - Passing a literal value Structure is documented below.
- literal
Value Property Map - Passing a literal value Structure is documented below.
AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue, AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValueArgs
- String
Value string - String.
- String
Value string - String.
- string
Value String - String.
- string
Value string - String.
- string_
value str - String.
- string
Value String - String.
AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue, AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueArgs
- Literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Value Literal Value - Passing a literal value Structure is documented below.
- Literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Value Literal Value - Passing a literal value Structure is documented below.
- literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Value Literal Value - Passing a literal value Structure is documented below.
- literal
Value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Value Literal Value - Passing a literal value Structure is documented below.
- literal_
value AuthConfig Decrypted Credential Oauth2Client Credentials Token Params Entry Value Literal Value - Passing a literal value Structure is documented below.
- literal
Value Property Map - Passing a literal value Structure is documented below.
AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue, AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValueArgs
- String
Value string - String.
- String
Value string - String.
- string
Value String - String.
- string
Value string - String.
- string_
value str - String.
- string
Value String - String.
AuthConfigDecryptedCredentialOidcToken, AuthConfigDecryptedCredentialOidcTokenArgs
- Audience string
- Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
- Service
Account stringEmail - The service account email to be used as the identity for the token.
- Token string
- (Output) ID token obtained for the service account.
- Token
Expire stringTime - (Output) The approximate time until the token retrieved is valid. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- Audience string
- Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
- Service
Account stringEmail - The service account email to be used as the identity for the token.
- Token string
- (Output) ID token obtained for the service account.
- Token
Expire stringTime - (Output) The approximate time until the token retrieved is valid. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- audience String
- Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
- service
Account StringEmail - The service account email to be used as the identity for the token.
- token String
- (Output) ID token obtained for the service account.
- token
Expire StringTime - (Output) The approximate time until the token retrieved is valid. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- audience string
- Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
- service
Account stringEmail - The service account email to be used as the identity for the token.
- token string
- (Output) ID token obtained for the service account.
- token
Expire stringTime - (Output) The approximate time until the token retrieved is valid. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- audience str
- Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
- service_
account_ stremail - The service account email to be used as the identity for the token.
- token str
- (Output) ID token obtained for the service account.
- token_
expire_ strtime - (Output) The approximate time until the token retrieved is valid. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
- audience String
- Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
- service
Account StringEmail - The service account email to be used as the identity for the token.
- token String
- (Output) ID token obtained for the service account.
- token
Expire StringTime - (Output) The approximate time until the token retrieved is valid. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
AuthConfigDecryptedCredentialServiceAccountCredentials, AuthConfigDecryptedCredentialServiceAccountCredentialsArgs
- Scope string
- A space-delimited list of requested scope permissions.
- Service
Account string - Name of the service account that has the permission to make the request.
- Scope string
- A space-delimited list of requested scope permissions.
- Service
Account string - Name of the service account that has the permission to make the request.
- scope String
- A space-delimited list of requested scope permissions.
- service
Account String - Name of the service account that has the permission to make the request.
- scope string
- A space-delimited list of requested scope permissions.
- service
Account string - Name of the service account that has the permission to make the request.
- scope str
- A space-delimited list of requested scope permissions.
- service_
account str - Name of the service account that has the permission to make the request.
- scope String
- A space-delimited list of requested scope permissions.
- service
Account String - Name of the service account that has the permission to make the request.
AuthConfigDecryptedCredentialUsernameAndPassword, AuthConfigDecryptedCredentialUsernameAndPasswordArgs
Import
AuthConfig can be imported using any of these accepted formats:
{{project}}/{{name}}
{{project}} {{name}}
{{name}}
When using the pulumi import
command, AuthConfig can be imported using one of the formats above. For example:
$ pulumi import gcp:applicationintegration/authConfig:AuthConfig default {{project}}/{{name}}
$ pulumi import gcp:applicationintegration/authConfig:AuthConfig default "{{project}} {{name}}"
$ pulumi import gcp:applicationintegration/authConfig:AuthConfig default {{name}}
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Google Cloud (GCP) Classic pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
google-beta
Terraform Provider.