1. Packages
  2. Juniper Mist
  3. API Docs
  4. org
  5. Nacidp
Juniper Mist v0.1.1 published on Monday, Nov 4, 2024 by Pulumi

junipermist.org.Nacidp

Explore with Pulumi AI

junipermist logo
Juniper Mist v0.1.1 published on Monday, Nov 4, 2024 by Pulumi

    This resource manages NAC IDPs (Identity Providers). The NAC IDPs to validate NAC client accounts against an IDP with OAuth2.0, LDAP/LDAPS, or a local Mist Edge. Mist Access Assurance can also retrieve group membership from the IDP, and use this information in the NAC Rules (junipermist.org.Nacrule resource)

    IMPORTANT:

    • Once created, the NAC IDP must be registered in the junipermist.org.Setting resource (full path: mist_org_setting.mist_nac.idps).
    • The associated REALMS are configured under mist_org_setting.mist_nac.idps
    • To make the IDP the Default IDP, set the IDP ID under mist_org_setting.mist_nac.default_idp_id

    For SAML IDP, the NAC IDP Metadata can be retrieved with the junipermist.org.getNacidpMetadata data source.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as junipermist from "@pulumi/juniper-mist";
    
    // OAuth with Azure Example
    const idpAzure = new junipermist.org.Nacidp("idp_azure", {
        orgId: terraformTest.id,
        name: "idp_azure",
        idpType: "oauth",
        oauthCcClientId: "client_id",
        oauthCcClientSecret: "-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----",
        oauthRopcClientId: "ropc_client_id",
        oauthRopcClientSecret: "ropc_client_secret",
        oauthTenantId: "tenant_id",
        oauthType: "azure",
    });
    // Custom LDAP Example
    const idpLdap = new junipermist.org.Nacidp("idp_ldap", {
        orgId: terraformTest.id,
        name: "idp_ldap",
        idpType: "ldap",
        ldapType: "custom",
        groupFilter: "memberOf",
        memberFilter: "memberOf",
        ldapUserFilter: "(mail=%s)",
        ldapServerHosts: [
            "ldap.mycorp.com",
            "1.2.3.4",
        ],
        ldapBaseDn: "DC=abc,DC=com",
        ldapBindDn: "CN=admin,CN=users,DC=abc,DC=com",
        ldapBindPassword: "secret!password",
        ldapCacerts: [
            `-----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----`,
            `-----BEGIN CERTIFICATE-----
    BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----`,
        ],
        ldapClientCert: `-----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----`,
        ldapClientKey: "-----BEGIN PRI...",
    });
    
    import pulumi
    import pulumi_juniper_mist as junipermist
    
    # OAuth with Azure Example
    idp_azure = junipermist.org.Nacidp("idp_azure",
        org_id=terraform_test["id"],
        name="idp_azure",
        idp_type="oauth",
        oauth_cc_client_id="client_id",
        oauth_cc_client_secret="-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----",
        oauth_ropc_client_id="ropc_client_id",
        oauth_ropc_client_secret="ropc_client_secret",
        oauth_tenant_id="tenant_id",
        oauth_type="azure")
    # Custom LDAP Example
    idp_ldap = junipermist.org.Nacidp("idp_ldap",
        org_id=terraform_test["id"],
        name="idp_ldap",
        idp_type="ldap",
        ldap_type="custom",
        group_filter="memberOf",
        member_filter="memberOf",
        ldap_user_filter="(mail=%s)",
        ldap_server_hosts=[
            "ldap.mycorp.com",
            "1.2.3.4",
        ],
        ldap_base_dn="DC=abc,DC=com",
        ldap_bind_dn="CN=admin,CN=users,DC=abc,DC=com",
        ldap_bind_password="secret!password",
        ldap_cacerts=[
            """-----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----""",
            """-----BEGIN CERTIFICATE-----
    BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----""",
        ],
        ldap_client_cert="""-----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----""",
        ldap_client_key="-----BEGIN PRI...")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-junipermist/sdk/go/junipermist/org"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		// OAuth with Azure Example
    		_, err := org.NewNacidp(ctx, "idp_azure", &org.NacidpArgs{
    			OrgId:                 pulumi.Any(terraformTest.Id),
    			Name:                  pulumi.String("idp_azure"),
    			IdpType:               pulumi.String("oauth"),
    			OauthCcClientId:       pulumi.String("client_id"),
    			OauthCcClientSecret:   pulumi.String("-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----"),
    			OauthRopcClientId:     pulumi.String("ropc_client_id"),
    			OauthRopcClientSecret: pulumi.String("ropc_client_secret"),
    			OauthTenantId:         pulumi.String("tenant_id"),
    			OauthType:             pulumi.String("azure"),
    		})
    		if err != nil {
    			return err
    		}
    		// Custom LDAP Example
    		_, err = org.NewNacidp(ctx, "idp_ldap", &org.NacidpArgs{
    			OrgId:          pulumi.Any(terraformTest.Id),
    			Name:           pulumi.String("idp_ldap"),
    			IdpType:        pulumi.String("ldap"),
    			LdapType:       pulumi.String("custom"),
    			GroupFilter:    pulumi.String("memberOf"),
    			MemberFilter:   pulumi.String("memberOf"),
    			LdapUserFilter: pulumi.String("(mail=%s)"),
    			LdapServerHosts: pulumi.StringArray{
    				pulumi.String("ldap.mycorp.com"),
    				pulumi.String("1.2.3.4"),
    			},
    			LdapBaseDn:       pulumi.String("DC=abc,DC=com"),
    			LdapBindDn:       pulumi.String("CN=admin,CN=users,DC=abc,DC=com"),
    			LdapBindPassword: pulumi.String("secret!password"),
    			LdapCacerts: pulumi.StringArray{
    				pulumi.String("-----BEGIN CERTIFICATE-----\nMIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE\n-----END CERTIFICATE-----"),
    				pulumi.String("-----BEGIN CERTIFICATE-----\nBhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----"),
    			},
    			LdapClientCert: pulumi.String("-----BEGIN CERTIFICATE-----\nMIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE\n-----END CERTIFICATE-----"),
    			LdapClientKey:  pulumi.String("-----BEGIN PRI..."),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using JuniperMist = Pulumi.JuniperMist;
    
    return await Deployment.RunAsync(() => 
    {
        // OAuth with Azure Example
        var idpAzure = new JuniperMist.Org.Nacidp("idp_azure", new()
        {
            OrgId = terraformTest.Id,
            Name = "idp_azure",
            IdpType = "oauth",
            OauthCcClientId = "client_id",
            OauthCcClientSecret = "-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----",
            OauthRopcClientId = "ropc_client_id",
            OauthRopcClientSecret = "ropc_client_secret",
            OauthTenantId = "tenant_id",
            OauthType = "azure",
        });
    
        // Custom LDAP Example
        var idpLdap = new JuniperMist.Org.Nacidp("idp_ldap", new()
        {
            OrgId = terraformTest.Id,
            Name = "idp_ldap",
            IdpType = "ldap",
            LdapType = "custom",
            GroupFilter = "memberOf",
            MemberFilter = "memberOf",
            LdapUserFilter = "(mail=%s)",
            LdapServerHosts = new[]
            {
                "ldap.mycorp.com",
                "1.2.3.4",
            },
            LdapBaseDn = "DC=abc,DC=com",
            LdapBindDn = "CN=admin,CN=users,DC=abc,DC=com",
            LdapBindPassword = "secret!password",
            LdapCacerts = new[]
            {
                @"-----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----",
                @"-----BEGIN CERTIFICATE-----
    BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----",
            },
            LdapClientCert = @"-----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----",
            LdapClientKey = "-----BEGIN PRI...",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.junipermist.org.Nacidp;
    import com.pulumi.junipermist.org.NacidpArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // OAuth with Azure Example
            var idpAzure = new Nacidp("idpAzure", NacidpArgs.builder()
                .orgId(terraformTest.id())
                .name("idp_azure")
                .idpType("oauth")
                .oauthCcClientId("client_id")
                .oauthCcClientSecret("-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----")
                .oauthRopcClientId("ropc_client_id")
                .oauthRopcClientSecret("ropc_client_secret")
                .oauthTenantId("tenant_id")
                .oauthType("azure")
                .build());
    
            // Custom LDAP Example
            var idpLdap = new Nacidp("idpLdap", NacidpArgs.builder()
                .orgId(terraformTest.id())
                .name("idp_ldap")
                .idpType("ldap")
                .ldapType("custom")
                .groupFilter("memberOf")
                .memberFilter("memberOf")
                .ldapUserFilter("(mail=%s)")
                .ldapServerHosts(            
                    "ldap.mycorp.com",
                    "1.2.3.4")
                .ldapBaseDn("DC=abc,DC=com")
                .ldapBindDn("CN=admin,CN=users,DC=abc,DC=com")
                .ldapBindPassword("secret!password")
                .ldapCacerts(            
                    """
    -----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----                """,
                    """
    -----BEGIN CERTIFICATE-----
    BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----                """)
                .ldapClientCert("""
    -----BEGIN CERTIFICATE-----
    MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
    -----END CERTIFICATE-----            """)
                .ldapClientKey("-----BEGIN PRI...")
                .build());
    
        }
    }
    
    resources:
      # OAuth with Azure Example
      idpAzure:
        type: junipermist:org:Nacidp
        name: idp_azure
        properties:
          orgId: ${terraformTest.id}
          name: idp_azure
          idpType: oauth
          oauthCcClientId: client_id
          oauthCcClientSecret: '-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----'
          oauthRopcClientId: ropc_client_id
          oauthRopcClientSecret: ropc_client_secret
          oauthTenantId: tenant_id
          oauthType: azure
      # Custom LDAP Example
      idpLdap:
        type: junipermist:org:Nacidp
        name: idp_ldap
        properties:
          orgId: ${terraformTest.id}
          name: idp_ldap
          idpType: ldap
          ldapType: custom
          groupFilter: memberOf
          memberFilter: memberOf
          ldapUserFilter: (mail=%s)
          ldapServerHosts:
            - ldap.mycorp.com
            - 1.2.3.4
          ldapBaseDn: DC=abc,DC=com
          ldapBindDn: CN=admin,CN=users,DC=abc,DC=com
          ldapBindPassword: secret!password
          ldapCacerts:
            - |-
              -----BEGIN CERTIFICATE-----
              MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
              -----END CERTIFICATE-----          
            - |-
              -----BEGIN CERTIFICATE-----
              BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----          
          ldapClientCert: |-
            -----BEGIN CERTIFICATE-----
            MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
            -----END CERTIFICATE-----        
          ldapClientKey: '-----BEGIN PRI...'
    

    Create Nacidp Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new Nacidp(name: string, args: NacidpArgs, opts?: CustomResourceOptions);
    @overload
    def Nacidp(resource_name: str,
               args: NacidpArgs,
               opts: Optional[ResourceOptions] = None)
    
    @overload
    def Nacidp(resource_name: str,
               opts: Optional[ResourceOptions] = None,
               org_id: Optional[str] = None,
               idp_type: Optional[str] = None,
               ldap_type: Optional[str] = None,
               ldap_bind_password: Optional[str] = None,
               ldap_user_filter: Optional[str] = None,
               ldap_cacerts: Optional[Sequence[str]] = None,
               ldap_client_cert: Optional[str] = None,
               ldap_client_key: Optional[str] = None,
               ldap_group_attr: Optional[str] = None,
               ldap_group_dn: Optional[str] = None,
               member_filter: Optional[str] = None,
               ldap_server_hosts: Optional[Sequence[str]] = None,
               ldap_base_dn: Optional[str] = None,
               ldap_bind_dn: Optional[str] = None,
               ldap_resolve_groups: Optional[bool] = None,
               name: Optional[str] = None,
               oauth_cc_client_id: Optional[str] = None,
               oauth_cc_client_secret: Optional[str] = None,
               oauth_discovery_url: Optional[str] = None,
               oauth_ropc_client_id: Optional[str] = None,
               oauth_ropc_client_secret: Optional[str] = None,
               oauth_tenant_id: Optional[str] = None,
               oauth_type: Optional[str] = None,
               group_filter: Optional[str] = None)
    func NewNacidp(ctx *Context, name string, args NacidpArgs, opts ...ResourceOption) (*Nacidp, error)
    public Nacidp(string name, NacidpArgs args, CustomResourceOptions? opts = null)
    public Nacidp(String name, NacidpArgs args)
    public Nacidp(String name, NacidpArgs args, CustomResourceOptions options)
    
    type: junipermist:org:Nacidp
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args NacidpArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args NacidpArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args NacidpArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args NacidpArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args NacidpArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var nacidpResource = new JuniperMist.Org.Nacidp("nacidpResource", new()
    {
        OrgId = "string",
        IdpType = "string",
        LdapType = "string",
        LdapBindPassword = "string",
        LdapUserFilter = "string",
        LdapCacerts = new[]
        {
            "string",
        },
        LdapClientCert = "string",
        LdapClientKey = "string",
        LdapGroupAttr = "string",
        LdapGroupDn = "string",
        MemberFilter = "string",
        LdapServerHosts = new[]
        {
            "string",
        },
        LdapBaseDn = "string",
        LdapBindDn = "string",
        LdapResolveGroups = false,
        Name = "string",
        OauthCcClientId = "string",
        OauthCcClientSecret = "string",
        OauthDiscoveryUrl = "string",
        OauthRopcClientId = "string",
        OauthRopcClientSecret = "string",
        OauthTenantId = "string",
        OauthType = "string",
        GroupFilter = "string",
    });
    
    example, err := org.NewNacidp(ctx, "nacidpResource", &org.NacidpArgs{
    	OrgId:            pulumi.String("string"),
    	IdpType:          pulumi.String("string"),
    	LdapType:         pulumi.String("string"),
    	LdapBindPassword: pulumi.String("string"),
    	LdapUserFilter:   pulumi.String("string"),
    	LdapCacerts: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	LdapClientCert: pulumi.String("string"),
    	LdapClientKey:  pulumi.String("string"),
    	LdapGroupAttr:  pulumi.String("string"),
    	LdapGroupDn:    pulumi.String("string"),
    	MemberFilter:   pulumi.String("string"),
    	LdapServerHosts: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	LdapBaseDn:            pulumi.String("string"),
    	LdapBindDn:            pulumi.String("string"),
    	LdapResolveGroups:     pulumi.Bool(false),
    	Name:                  pulumi.String("string"),
    	OauthCcClientId:       pulumi.String("string"),
    	OauthCcClientSecret:   pulumi.String("string"),
    	OauthDiscoveryUrl:     pulumi.String("string"),
    	OauthRopcClientId:     pulumi.String("string"),
    	OauthRopcClientSecret: pulumi.String("string"),
    	OauthTenantId:         pulumi.String("string"),
    	OauthType:             pulumi.String("string"),
    	GroupFilter:           pulumi.String("string"),
    })
    
    var nacidpResource = new Nacidp("nacidpResource", NacidpArgs.builder()
        .orgId("string")
        .idpType("string")
        .ldapType("string")
        .ldapBindPassword("string")
        .ldapUserFilter("string")
        .ldapCacerts("string")
        .ldapClientCert("string")
        .ldapClientKey("string")
        .ldapGroupAttr("string")
        .ldapGroupDn("string")
        .memberFilter("string")
        .ldapServerHosts("string")
        .ldapBaseDn("string")
        .ldapBindDn("string")
        .ldapResolveGroups(false)
        .name("string")
        .oauthCcClientId("string")
        .oauthCcClientSecret("string")
        .oauthDiscoveryUrl("string")
        .oauthRopcClientId("string")
        .oauthRopcClientSecret("string")
        .oauthTenantId("string")
        .oauthType("string")
        .groupFilter("string")
        .build());
    
    nacidp_resource = junipermist.org.Nacidp("nacidpResource",
        org_id="string",
        idp_type="string",
        ldap_type="string",
        ldap_bind_password="string",
        ldap_user_filter="string",
        ldap_cacerts=["string"],
        ldap_client_cert="string",
        ldap_client_key="string",
        ldap_group_attr="string",
        ldap_group_dn="string",
        member_filter="string",
        ldap_server_hosts=["string"],
        ldap_base_dn="string",
        ldap_bind_dn="string",
        ldap_resolve_groups=False,
        name="string",
        oauth_cc_client_id="string",
        oauth_cc_client_secret="string",
        oauth_discovery_url="string",
        oauth_ropc_client_id="string",
        oauth_ropc_client_secret="string",
        oauth_tenant_id="string",
        oauth_type="string",
        group_filter="string")
    
    const nacidpResource = new junipermist.org.Nacidp("nacidpResource", {
        orgId: "string",
        idpType: "string",
        ldapType: "string",
        ldapBindPassword: "string",
        ldapUserFilter: "string",
        ldapCacerts: ["string"],
        ldapClientCert: "string",
        ldapClientKey: "string",
        ldapGroupAttr: "string",
        ldapGroupDn: "string",
        memberFilter: "string",
        ldapServerHosts: ["string"],
        ldapBaseDn: "string",
        ldapBindDn: "string",
        ldapResolveGroups: false,
        name: "string",
        oauthCcClientId: "string",
        oauthCcClientSecret: "string",
        oauthDiscoveryUrl: "string",
        oauthRopcClientId: "string",
        oauthRopcClientSecret: "string",
        oauthTenantId: "string",
        oauthType: "string",
        groupFilter: "string",
    });
    
    type: junipermist:org:Nacidp
    properties:
        groupFilter: string
        idpType: string
        ldapBaseDn: string
        ldapBindDn: string
        ldapBindPassword: string
        ldapCacerts:
            - string
        ldapClientCert: string
        ldapClientKey: string
        ldapGroupAttr: string
        ldapGroupDn: string
        ldapResolveGroups: false
        ldapServerHosts:
            - string
        ldapType: string
        ldapUserFilter: string
        memberFilter: string
        name: string
        oauthCcClientId: string
        oauthCcClientSecret: string
        oauthDiscoveryUrl: string
        oauthRopcClientId: string
        oauthRopcClientSecret: string
        oauthTenantId: string
        oauthType: string
        orgId: string
    

    Nacidp Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The Nacidp resource accepts the following input properties:

    IdpType string
    enum: ldap, mxedge_proxy, oauth
    OrgId string
    GroupFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    LdapBaseDn string
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    LdapBindDn string
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    LdapBindPassword string
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    LdapCacerts List<string>
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    LdapClientCert string
    if idp_type==ldap, LDAPS Client certificate
    LdapClientKey string
    if idp_type==ldap, Key for the ldap_client_cert
    LdapGroupAttr string
    if ldap_type==custom
    LdapGroupDn string
    if ldap_type==custom
    LdapResolveGroups bool
    if idp_type==ldap, whether to recursively resolve LDAP groups
    LdapServerHosts List<string>
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    LdapType string
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    LdapUserFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    MemberFilter string
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    Name string
    name
    OauthCcClientId string
    Required if idp_type==oauth, Client Credentials
    OauthCcClientSecret string
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    OauthDiscoveryUrl string
    if idp_type==oauth
    OauthRopcClientId string
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    OauthRopcClientSecret string
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    OauthTenantId string
    Required if idp_type==oauth, oauthtenantid
    OauthType string
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    IdpType string
    enum: ldap, mxedge_proxy, oauth
    OrgId string
    GroupFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    LdapBaseDn string
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    LdapBindDn string
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    LdapBindPassword string
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    LdapCacerts []string
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    LdapClientCert string
    if idp_type==ldap, LDAPS Client certificate
    LdapClientKey string
    if idp_type==ldap, Key for the ldap_client_cert
    LdapGroupAttr string
    if ldap_type==custom
    LdapGroupDn string
    if ldap_type==custom
    LdapResolveGroups bool
    if idp_type==ldap, whether to recursively resolve LDAP groups
    LdapServerHosts []string
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    LdapType string
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    LdapUserFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    MemberFilter string
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    Name string
    name
    OauthCcClientId string
    Required if idp_type==oauth, Client Credentials
    OauthCcClientSecret string
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    OauthDiscoveryUrl string
    if idp_type==oauth
    OauthRopcClientId string
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    OauthRopcClientSecret string
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    OauthTenantId string
    Required if idp_type==oauth, oauthtenantid
    OauthType string
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    idpType String
    enum: ldap, mxedge_proxy, oauth
    orgId String
    groupFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    ldapBaseDn String
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldapBindDn String
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldapBindPassword String
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldapCacerts List<String>
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldapClientCert String
    if idp_type==ldap, LDAPS Client certificate
    ldapClientKey String
    if idp_type==ldap, Key for the ldap_client_cert
    ldapGroupAttr String
    if ldap_type==custom
    ldapGroupDn String
    if ldap_type==custom
    ldapResolveGroups Boolean
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldapServerHosts List<String>
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldapType String
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldapUserFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    memberFilter String
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name String
    name
    oauthCcClientId String
    Required if idp_type==oauth, Client Credentials
    oauthCcClientSecret String
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauthDiscoveryUrl String
    if idp_type==oauth
    oauthRopcClientId String
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauthRopcClientSecret String
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauthTenantId String
    Required if idp_type==oauth, oauthtenantid
    oauthType String
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    idpType string
    enum: ldap, mxedge_proxy, oauth
    orgId string
    groupFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    ldapBaseDn string
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldapBindDn string
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldapBindPassword string
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldapCacerts string[]
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldapClientCert string
    if idp_type==ldap, LDAPS Client certificate
    ldapClientKey string
    if idp_type==ldap, Key for the ldap_client_cert
    ldapGroupAttr string
    if ldap_type==custom
    ldapGroupDn string
    if ldap_type==custom
    ldapResolveGroups boolean
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldapServerHosts string[]
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldapType string
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldapUserFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    memberFilter string
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name string
    name
    oauthCcClientId string
    Required if idp_type==oauth, Client Credentials
    oauthCcClientSecret string
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauthDiscoveryUrl string
    if idp_type==oauth
    oauthRopcClientId string
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauthRopcClientSecret string
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauthTenantId string
    Required if idp_type==oauth, oauthtenantid
    oauthType string
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    idp_type str
    enum: ldap, mxedge_proxy, oauth
    org_id str
    group_filter str
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    ldap_base_dn str
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldap_bind_dn str
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldap_bind_password str
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldap_cacerts Sequence[str]
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldap_client_cert str
    if idp_type==ldap, LDAPS Client certificate
    ldap_client_key str
    if idp_type==ldap, Key for the ldap_client_cert
    ldap_group_attr str
    if ldap_type==custom
    ldap_group_dn str
    if ldap_type==custom
    ldap_resolve_groups bool
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldap_server_hosts Sequence[str]
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldap_type str
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldap_user_filter str
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    member_filter str
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name str
    name
    oauth_cc_client_id str
    Required if idp_type==oauth, Client Credentials
    oauth_cc_client_secret str
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauth_discovery_url str
    if idp_type==oauth
    oauth_ropc_client_id str
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauth_ropc_client_secret str
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauth_tenant_id str
    Required if idp_type==oauth, oauthtenantid
    oauth_type str
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    idpType String
    enum: ldap, mxedge_proxy, oauth
    orgId String
    groupFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    ldapBaseDn String
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldapBindDn String
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldapBindPassword String
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldapCacerts List<String>
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldapClientCert String
    if idp_type==ldap, LDAPS Client certificate
    ldapClientKey String
    if idp_type==ldap, Key for the ldap_client_cert
    ldapGroupAttr String
    if ldap_type==custom
    ldapGroupDn String
    if ldap_type==custom
    ldapResolveGroups Boolean
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldapServerHosts List<String>
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldapType String
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldapUserFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    memberFilter String
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name String
    name
    oauthCcClientId String
    Required if idp_type==oauth, Client Credentials
    oauthCcClientSecret String
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauthDiscoveryUrl String
    if idp_type==oauth
    oauthRopcClientId String
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauthRopcClientSecret String
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauthTenantId String
    Required if idp_type==oauth, oauthtenantid
    oauthType String
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity

    Outputs

    All input properties are implicitly available as output properties. Additionally, the Nacidp resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing Nacidp Resource

    Get an existing Nacidp resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: NacidpState, opts?: CustomResourceOptions): Nacidp
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            group_filter: Optional[str] = None,
            idp_type: Optional[str] = None,
            ldap_base_dn: Optional[str] = None,
            ldap_bind_dn: Optional[str] = None,
            ldap_bind_password: Optional[str] = None,
            ldap_cacerts: Optional[Sequence[str]] = None,
            ldap_client_cert: Optional[str] = None,
            ldap_client_key: Optional[str] = None,
            ldap_group_attr: Optional[str] = None,
            ldap_group_dn: Optional[str] = None,
            ldap_resolve_groups: Optional[bool] = None,
            ldap_server_hosts: Optional[Sequence[str]] = None,
            ldap_type: Optional[str] = None,
            ldap_user_filter: Optional[str] = None,
            member_filter: Optional[str] = None,
            name: Optional[str] = None,
            oauth_cc_client_id: Optional[str] = None,
            oauth_cc_client_secret: Optional[str] = None,
            oauth_discovery_url: Optional[str] = None,
            oauth_ropc_client_id: Optional[str] = None,
            oauth_ropc_client_secret: Optional[str] = None,
            oauth_tenant_id: Optional[str] = None,
            oauth_type: Optional[str] = None,
            org_id: Optional[str] = None) -> Nacidp
    func GetNacidp(ctx *Context, name string, id IDInput, state *NacidpState, opts ...ResourceOption) (*Nacidp, error)
    public static Nacidp Get(string name, Input<string> id, NacidpState? state, CustomResourceOptions? opts = null)
    public static Nacidp get(String name, Output<String> id, NacidpState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    GroupFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    IdpType string
    enum: ldap, mxedge_proxy, oauth
    LdapBaseDn string
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    LdapBindDn string
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    LdapBindPassword string
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    LdapCacerts List<string>
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    LdapClientCert string
    if idp_type==ldap, LDAPS Client certificate
    LdapClientKey string
    if idp_type==ldap, Key for the ldap_client_cert
    LdapGroupAttr string
    if ldap_type==custom
    LdapGroupDn string
    if ldap_type==custom
    LdapResolveGroups bool
    if idp_type==ldap, whether to recursively resolve LDAP groups
    LdapServerHosts List<string>
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    LdapType string
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    LdapUserFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    MemberFilter string
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    Name string
    name
    OauthCcClientId string
    Required if idp_type==oauth, Client Credentials
    OauthCcClientSecret string
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    OauthDiscoveryUrl string
    if idp_type==oauth
    OauthRopcClientId string
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    OauthRopcClientSecret string
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    OauthTenantId string
    Required if idp_type==oauth, oauthtenantid
    OauthType string
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    OrgId string
    GroupFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    IdpType string
    enum: ldap, mxedge_proxy, oauth
    LdapBaseDn string
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    LdapBindDn string
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    LdapBindPassword string
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    LdapCacerts []string
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    LdapClientCert string
    if idp_type==ldap, LDAPS Client certificate
    LdapClientKey string
    if idp_type==ldap, Key for the ldap_client_cert
    LdapGroupAttr string
    if ldap_type==custom
    LdapGroupDn string
    if ldap_type==custom
    LdapResolveGroups bool
    if idp_type==ldap, whether to recursively resolve LDAP groups
    LdapServerHosts []string
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    LdapType string
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    LdapUserFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    MemberFilter string
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    Name string
    name
    OauthCcClientId string
    Required if idp_type==oauth, Client Credentials
    OauthCcClientSecret string
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    OauthDiscoveryUrl string
    if idp_type==oauth
    OauthRopcClientId string
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    OauthRopcClientSecret string
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    OauthTenantId string
    Required if idp_type==oauth, oauthtenantid
    OauthType string
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    OrgId string
    groupFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    idpType String
    enum: ldap, mxedge_proxy, oauth
    ldapBaseDn String
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldapBindDn String
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldapBindPassword String
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldapCacerts List<String>
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldapClientCert String
    if idp_type==ldap, LDAPS Client certificate
    ldapClientKey String
    if idp_type==ldap, Key for the ldap_client_cert
    ldapGroupAttr String
    if ldap_type==custom
    ldapGroupDn String
    if ldap_type==custom
    ldapResolveGroups Boolean
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldapServerHosts List<String>
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldapType String
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldapUserFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    memberFilter String
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name String
    name
    oauthCcClientId String
    Required if idp_type==oauth, Client Credentials
    oauthCcClientSecret String
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauthDiscoveryUrl String
    if idp_type==oauth
    oauthRopcClientId String
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauthRopcClientSecret String
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauthTenantId String
    Required if idp_type==oauth, oauthtenantid
    oauthType String
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    orgId String
    groupFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    idpType string
    enum: ldap, mxedge_proxy, oauth
    ldapBaseDn string
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldapBindDn string
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldapBindPassword string
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldapCacerts string[]
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldapClientCert string
    if idp_type==ldap, LDAPS Client certificate
    ldapClientKey string
    if idp_type==ldap, Key for the ldap_client_cert
    ldapGroupAttr string
    if ldap_type==custom
    ldapGroupDn string
    if ldap_type==custom
    ldapResolveGroups boolean
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldapServerHosts string[]
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldapType string
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldapUserFilter string
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    memberFilter string
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name string
    name
    oauthCcClientId string
    Required if idp_type==oauth, Client Credentials
    oauthCcClientSecret string
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauthDiscoveryUrl string
    if idp_type==oauth
    oauthRopcClientId string
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauthRopcClientSecret string
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauthTenantId string
    Required if idp_type==oauth, oauthtenantid
    oauthType string
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    orgId string
    group_filter str
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    idp_type str
    enum: ldap, mxedge_proxy, oauth
    ldap_base_dn str
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldap_bind_dn str
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldap_bind_password str
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldap_cacerts Sequence[str]
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldap_client_cert str
    if idp_type==ldap, LDAPS Client certificate
    ldap_client_key str
    if idp_type==ldap, Key for the ldap_client_cert
    ldap_group_attr str
    if ldap_type==custom
    ldap_group_dn str
    if ldap_type==custom
    ldap_resolve_groups bool
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldap_server_hosts Sequence[str]
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldap_type str
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldap_user_filter str
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    member_filter str
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name str
    name
    oauth_cc_client_id str
    Required if idp_type==oauth, Client Credentials
    oauth_cc_client_secret str
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauth_discovery_url str
    if idp_type==oauth
    oauth_ropc_client_id str
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauth_ropc_client_secret str
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauth_tenant_id str
    Required if idp_type==oauth, oauthtenantid
    oauth_type str
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    org_id str
    groupFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of group
    idpType String
    enum: ldap, mxedge_proxy, oauth
    ldapBaseDn String
    Required if idp_type==ldap, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree
    ldapBindDn String
    Required if idp_type==ldap, the account used to authenticate against the LDAP
    ldapBindPassword String
    Required if idp_type==ldap, the password used to authenticate against the LDAP
    ldapCacerts List<String>
    Required if idp_type==ldap, list of CA certificates to validate the LDAP certificate
    ldapClientCert String
    if idp_type==ldap, LDAPS Client certificate
    ldapClientKey String
    if idp_type==ldap, Key for the ldap_client_cert
    ldapGroupAttr String
    if ldap_type==custom
    ldapGroupDn String
    if ldap_type==custom
    ldapResolveGroups Boolean
    if idp_type==ldap, whether to recursively resolve LDAP groups
    ldapServerHosts List<String>
    if idp_type==ldap, list of LDAP/LDAPS server IP Addresses or Hostnames
    ldapType String
    if idp_type==ldap. enum: azure, custom, google, okta, ping_identity
    ldapUserFilter String
    Required if ldap_type==custom, LDAP filter that will identify the type of user
    memberFilter String
    Required if ldap_type==custom,LDAP filter that will identify the type of member
    name String
    name
    oauthCcClientId String
    Required if idp_type==oauth, Client Credentials
    oauthCcClientSecret String
    Required if idp_type==oauth, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...."
    oauthDiscoveryUrl String
    if idp_type==oauth
    oauthRopcClientId String
    if idp_type==oauth, ropc = Resource Owner Password Credentials
    oauthRopcClientSecret String
    if oauth_type==azure or oauth_type==azure-gov. oauthropcclient_secret can be empty
    oauthTenantId String
    Required if idp_type==oauth, oauthtenantid
    oauthType String
    if idp_type==oauth. enum: azure, azure-gov, okta, ping_identity
    orgId String

    Import

    Using pulumi import, import mist_org_nacidp with:

    Org PSK can be imported by specifying the org_id and the nacidp_id

    $ pulumi import junipermist:org/nacidp:Nacidp idp_azure 17b46405-3a6d-4715-8bb4-6bb6d06f316a.d3c42998-9012-4859-9743-6b9bee475309
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    junipermist pulumi/pulumi-junipermist
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the mist Terraform Provider.
    junipermist logo
    Juniper Mist v0.1.1 published on Monday, Nov 4, 2024 by Pulumi