junipermist.org.Nacidp
Explore with Pulumi AI
This resource manages NAC IDPs (Identity Providers).
The NAC IDPs to validate NAC client accounts against an IDP with OAuth2.0, LDAP/LDAPS, or a local Mist Edge.
Mist Access Assurance can also retrieve group membership from the IDP, and use this information in the NAC Rules (junipermist.org.Nacrule
resource)
IMPORTANT:
- Once created, the NAC IDP must be registered in the
junipermist.org.Setting
resource (full path:mist_org_setting.mist_nac.idps
). - The associated REALMS are configured under
mist_org_setting.mist_nac.idps
- To make the IDP the Default IDP, set the IDP ID under
mist_org_setting.mist_nac.default_idp_id
For SAML IDP, the NAC IDP Metadata can be retrieved with the junipermist.org.getNacidpMetadata
data source.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as junipermist from "@pulumi/juniper-mist";
// OAuth with Azure Example
const idpAzure = new junipermist.org.Nacidp("idp_azure", {
orgId: terraformTest.id,
name: "idp_azure",
idpType: "oauth",
oauthCcClientId: "client_id",
oauthCcClientSecret: "-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----",
oauthRopcClientId: "ropc_client_id",
oauthRopcClientSecret: "ropc_client_secret",
oauthTenantId: "tenant_id",
oauthType: "azure",
});
// Custom LDAP Example
const idpLdap = new junipermist.org.Nacidp("idp_ldap", {
orgId: terraformTest.id,
name: "idp_ldap",
idpType: "ldap",
ldapType: "custom",
groupFilter: "memberOf",
memberFilter: "memberOf",
ldapUserFilter: "(mail=%s)",
ldapServerHosts: [
"ldap.mycorp.com",
"1.2.3.4",
],
ldapBaseDn: "DC=abc,DC=com",
ldapBindDn: "CN=admin,CN=users,DC=abc,DC=com",
ldapBindPassword: "secret!password",
ldapCacerts: [
`-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----`,
`-----BEGIN CERTIFICATE-----
BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----`,
],
ldapClientCert: `-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----`,
ldapClientKey: "-----BEGIN PRI...",
});
import pulumi
import pulumi_juniper_mist as junipermist
# OAuth with Azure Example
idp_azure = junipermist.org.Nacidp("idp_azure",
org_id=terraform_test["id"],
name="idp_azure",
idp_type="oauth",
oauth_cc_client_id="client_id",
oauth_cc_client_secret="-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----",
oauth_ropc_client_id="ropc_client_id",
oauth_ropc_client_secret="ropc_client_secret",
oauth_tenant_id="tenant_id",
oauth_type="azure")
# Custom LDAP Example
idp_ldap = junipermist.org.Nacidp("idp_ldap",
org_id=terraform_test["id"],
name="idp_ldap",
idp_type="ldap",
ldap_type="custom",
group_filter="memberOf",
member_filter="memberOf",
ldap_user_filter="(mail=%s)",
ldap_server_hosts=[
"ldap.mycorp.com",
"1.2.3.4",
],
ldap_base_dn="DC=abc,DC=com",
ldap_bind_dn="CN=admin,CN=users,DC=abc,DC=com",
ldap_bind_password="secret!password",
ldap_cacerts=[
"""-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----""",
"""-----BEGIN CERTIFICATE-----
BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----""",
],
ldap_client_cert="""-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----""",
ldap_client_key="-----BEGIN PRI...")
package main
import (
"github.com/pulumi/pulumi-junipermist/sdk/go/junipermist/org"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
// OAuth with Azure Example
_, err := org.NewNacidp(ctx, "idp_azure", &org.NacidpArgs{
OrgId: pulumi.Any(terraformTest.Id),
Name: pulumi.String("idp_azure"),
IdpType: pulumi.String("oauth"),
OauthCcClientId: pulumi.String("client_id"),
OauthCcClientSecret: pulumi.String("-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----"),
OauthRopcClientId: pulumi.String("ropc_client_id"),
OauthRopcClientSecret: pulumi.String("ropc_client_secret"),
OauthTenantId: pulumi.String("tenant_id"),
OauthType: pulumi.String("azure"),
})
if err != nil {
return err
}
// Custom LDAP Example
_, err = org.NewNacidp(ctx, "idp_ldap", &org.NacidpArgs{
OrgId: pulumi.Any(terraformTest.Id),
Name: pulumi.String("idp_ldap"),
IdpType: pulumi.String("ldap"),
LdapType: pulumi.String("custom"),
GroupFilter: pulumi.String("memberOf"),
MemberFilter: pulumi.String("memberOf"),
LdapUserFilter: pulumi.String("(mail=%s)"),
LdapServerHosts: pulumi.StringArray{
pulumi.String("ldap.mycorp.com"),
pulumi.String("1.2.3.4"),
},
LdapBaseDn: pulumi.String("DC=abc,DC=com"),
LdapBindDn: pulumi.String("CN=admin,CN=users,DC=abc,DC=com"),
LdapBindPassword: pulumi.String("secret!password"),
LdapCacerts: pulumi.StringArray{
pulumi.String("-----BEGIN CERTIFICATE-----\nMIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE\n-----END CERTIFICATE-----"),
pulumi.String("-----BEGIN CERTIFICATE-----\nBhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----"),
},
LdapClientCert: pulumi.String("-----BEGIN CERTIFICATE-----\nMIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE\n-----END CERTIFICATE-----"),
LdapClientKey: pulumi.String("-----BEGIN PRI..."),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using JuniperMist = Pulumi.JuniperMist;
return await Deployment.RunAsync(() =>
{
// OAuth with Azure Example
var idpAzure = new JuniperMist.Org.Nacidp("idp_azure", new()
{
OrgId = terraformTest.Id,
Name = "idp_azure",
IdpType = "oauth",
OauthCcClientId = "client_id",
OauthCcClientSecret = "-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----",
OauthRopcClientId = "ropc_client_id",
OauthRopcClientSecret = "ropc_client_secret",
OauthTenantId = "tenant_id",
OauthType = "azure",
});
// Custom LDAP Example
var idpLdap = new JuniperMist.Org.Nacidp("idp_ldap", new()
{
OrgId = terraformTest.Id,
Name = "idp_ldap",
IdpType = "ldap",
LdapType = "custom",
GroupFilter = "memberOf",
MemberFilter = "memberOf",
LdapUserFilter = "(mail=%s)",
LdapServerHosts = new[]
{
"ldap.mycorp.com",
"1.2.3.4",
},
LdapBaseDn = "DC=abc,DC=com",
LdapBindDn = "CN=admin,CN=users,DC=abc,DC=com",
LdapBindPassword = "secret!password",
LdapCacerts = new[]
{
@"-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----",
@"-----BEGIN CERTIFICATE-----
BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----",
},
LdapClientCert = @"-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----",
LdapClientKey = "-----BEGIN PRI...",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.junipermist.org.Nacidp;
import com.pulumi.junipermist.org.NacidpArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
// OAuth with Azure Example
var idpAzure = new Nacidp("idpAzure", NacidpArgs.builder()
.orgId(terraformTest.id())
.name("idp_azure")
.idpType("oauth")
.oauthCcClientId("client_id")
.oauthCcClientSecret("-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----")
.oauthRopcClientId("ropc_client_id")
.oauthRopcClientSecret("ropc_client_secret")
.oauthTenantId("tenant_id")
.oauthType("azure")
.build());
// Custom LDAP Example
var idpLdap = new Nacidp("idpLdap", NacidpArgs.builder()
.orgId(terraformTest.id())
.name("idp_ldap")
.idpType("ldap")
.ldapType("custom")
.groupFilter("memberOf")
.memberFilter("memberOf")
.ldapUserFilter("(mail=%s)")
.ldapServerHosts(
"ldap.mycorp.com",
"1.2.3.4")
.ldapBaseDn("DC=abc,DC=com")
.ldapBindDn("CN=admin,CN=users,DC=abc,DC=com")
.ldapBindPassword("secret!password")
.ldapCacerts(
"""
-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE----- """,
"""
-----BEGIN CERTIFICATE-----
BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE----- """)
.ldapClientCert("""
-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE----- """)
.ldapClientKey("-----BEGIN PRI...")
.build());
}
}
resources:
# OAuth with Azure Example
idpAzure:
type: junipermist:org:Nacidp
name: idp_azure
properties:
orgId: ${terraformTest.id}
name: idp_azure
idpType: oauth
oauthCcClientId: client_id
oauthCcClientSecret: '-----BEGIN CERTIFICATE-----MIIF0jC .../fSCGx7-----END CERTIFICATE-----'
oauthRopcClientId: ropc_client_id
oauthRopcClientSecret: ropc_client_secret
oauthTenantId: tenant_id
oauthType: azure
# Custom LDAP Example
idpLdap:
type: junipermist:org:Nacidp
name: idp_ldap
properties:
orgId: ${terraformTest.id}
name: idp_ldap
idpType: ldap
ldapType: custom
groupFilter: memberOf
memberFilter: memberOf
ldapUserFilter: (mail=%s)
ldapServerHosts:
- ldap.mycorp.com
- 1.2.3.4
ldapBaseDn: DC=abc,DC=com
ldapBindDn: CN=admin,CN=users,DC=abc,DC=com
ldapBindPassword: secret!password
ldapCacerts:
- |-
-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----
- |-
-----BEGIN CERTIFICATE-----
BhMCRVMxFDASBgNVBAoMC1N0YXJ0Q29tIENBMSwwKgYDVn-----END CERTIFICATE-----
ldapClientCert: |-
-----BEGIN CERTIFICATE-----
MIIFZjCCA06gAwIBAgIIP61/1qm/uDowDQYJKoZIhvcNAQELBQE
-----END CERTIFICATE-----
ldapClientKey: '-----BEGIN PRI...'
Create Nacidp Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Nacidp(name: string, args: NacidpArgs, opts?: CustomResourceOptions);
@overload
def Nacidp(resource_name: str,
args: NacidpArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Nacidp(resource_name: str,
opts: Optional[ResourceOptions] = None,
org_id: Optional[str] = None,
idp_type: Optional[str] = None,
ldap_type: Optional[str] = None,
ldap_bind_password: Optional[str] = None,
ldap_user_filter: Optional[str] = None,
ldap_cacerts: Optional[Sequence[str]] = None,
ldap_client_cert: Optional[str] = None,
ldap_client_key: Optional[str] = None,
ldap_group_attr: Optional[str] = None,
ldap_group_dn: Optional[str] = None,
member_filter: Optional[str] = None,
ldap_server_hosts: Optional[Sequence[str]] = None,
ldap_base_dn: Optional[str] = None,
ldap_bind_dn: Optional[str] = None,
ldap_resolve_groups: Optional[bool] = None,
name: Optional[str] = None,
oauth_cc_client_id: Optional[str] = None,
oauth_cc_client_secret: Optional[str] = None,
oauth_discovery_url: Optional[str] = None,
oauth_ropc_client_id: Optional[str] = None,
oauth_ropc_client_secret: Optional[str] = None,
oauth_tenant_id: Optional[str] = None,
oauth_type: Optional[str] = None,
group_filter: Optional[str] = None)
func NewNacidp(ctx *Context, name string, args NacidpArgs, opts ...ResourceOption) (*Nacidp, error)
public Nacidp(string name, NacidpArgs args, CustomResourceOptions? opts = null)
public Nacidp(String name, NacidpArgs args)
public Nacidp(String name, NacidpArgs args, CustomResourceOptions options)
type: junipermist:org:Nacidp
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args NacidpArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args NacidpArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args NacidpArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args NacidpArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args NacidpArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var nacidpResource = new JuniperMist.Org.Nacidp("nacidpResource", new()
{
OrgId = "string",
IdpType = "string",
LdapType = "string",
LdapBindPassword = "string",
LdapUserFilter = "string",
LdapCacerts = new[]
{
"string",
},
LdapClientCert = "string",
LdapClientKey = "string",
LdapGroupAttr = "string",
LdapGroupDn = "string",
MemberFilter = "string",
LdapServerHosts = new[]
{
"string",
},
LdapBaseDn = "string",
LdapBindDn = "string",
LdapResolveGroups = false,
Name = "string",
OauthCcClientId = "string",
OauthCcClientSecret = "string",
OauthDiscoveryUrl = "string",
OauthRopcClientId = "string",
OauthRopcClientSecret = "string",
OauthTenantId = "string",
OauthType = "string",
GroupFilter = "string",
});
example, err := org.NewNacidp(ctx, "nacidpResource", &org.NacidpArgs{
OrgId: pulumi.String("string"),
IdpType: pulumi.String("string"),
LdapType: pulumi.String("string"),
LdapBindPassword: pulumi.String("string"),
LdapUserFilter: pulumi.String("string"),
LdapCacerts: pulumi.StringArray{
pulumi.String("string"),
},
LdapClientCert: pulumi.String("string"),
LdapClientKey: pulumi.String("string"),
LdapGroupAttr: pulumi.String("string"),
LdapGroupDn: pulumi.String("string"),
MemberFilter: pulumi.String("string"),
LdapServerHosts: pulumi.StringArray{
pulumi.String("string"),
},
LdapBaseDn: pulumi.String("string"),
LdapBindDn: pulumi.String("string"),
LdapResolveGroups: pulumi.Bool(false),
Name: pulumi.String("string"),
OauthCcClientId: pulumi.String("string"),
OauthCcClientSecret: pulumi.String("string"),
OauthDiscoveryUrl: pulumi.String("string"),
OauthRopcClientId: pulumi.String("string"),
OauthRopcClientSecret: pulumi.String("string"),
OauthTenantId: pulumi.String("string"),
OauthType: pulumi.String("string"),
GroupFilter: pulumi.String("string"),
})
var nacidpResource = new Nacidp("nacidpResource", NacidpArgs.builder()
.orgId("string")
.idpType("string")
.ldapType("string")
.ldapBindPassword("string")
.ldapUserFilter("string")
.ldapCacerts("string")
.ldapClientCert("string")
.ldapClientKey("string")
.ldapGroupAttr("string")
.ldapGroupDn("string")
.memberFilter("string")
.ldapServerHosts("string")
.ldapBaseDn("string")
.ldapBindDn("string")
.ldapResolveGroups(false)
.name("string")
.oauthCcClientId("string")
.oauthCcClientSecret("string")
.oauthDiscoveryUrl("string")
.oauthRopcClientId("string")
.oauthRopcClientSecret("string")
.oauthTenantId("string")
.oauthType("string")
.groupFilter("string")
.build());
nacidp_resource = junipermist.org.Nacidp("nacidpResource",
org_id="string",
idp_type="string",
ldap_type="string",
ldap_bind_password="string",
ldap_user_filter="string",
ldap_cacerts=["string"],
ldap_client_cert="string",
ldap_client_key="string",
ldap_group_attr="string",
ldap_group_dn="string",
member_filter="string",
ldap_server_hosts=["string"],
ldap_base_dn="string",
ldap_bind_dn="string",
ldap_resolve_groups=False,
name="string",
oauth_cc_client_id="string",
oauth_cc_client_secret="string",
oauth_discovery_url="string",
oauth_ropc_client_id="string",
oauth_ropc_client_secret="string",
oauth_tenant_id="string",
oauth_type="string",
group_filter="string")
const nacidpResource = new junipermist.org.Nacidp("nacidpResource", {
orgId: "string",
idpType: "string",
ldapType: "string",
ldapBindPassword: "string",
ldapUserFilter: "string",
ldapCacerts: ["string"],
ldapClientCert: "string",
ldapClientKey: "string",
ldapGroupAttr: "string",
ldapGroupDn: "string",
memberFilter: "string",
ldapServerHosts: ["string"],
ldapBaseDn: "string",
ldapBindDn: "string",
ldapResolveGroups: false,
name: "string",
oauthCcClientId: "string",
oauthCcClientSecret: "string",
oauthDiscoveryUrl: "string",
oauthRopcClientId: "string",
oauthRopcClientSecret: "string",
oauthTenantId: "string",
oauthType: "string",
groupFilter: "string",
});
type: junipermist:org:Nacidp
properties:
groupFilter: string
idpType: string
ldapBaseDn: string
ldapBindDn: string
ldapBindPassword: string
ldapCacerts:
- string
ldapClientCert: string
ldapClientKey: string
ldapGroupAttr: string
ldapGroupDn: string
ldapResolveGroups: false
ldapServerHosts:
- string
ldapType: string
ldapUserFilter: string
memberFilter: string
name: string
oauthCcClientId: string
oauthCcClientSecret: string
oauthDiscoveryUrl: string
oauthRopcClientId: string
oauthRopcClientSecret: string
oauthTenantId: string
oauthType: string
orgId: string
Nacidp Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Nacidp resource accepts the following input properties:
- Idp
Type string - enum:
ldap
,mxedge_proxy
,oauth
- Org
Id string - Group
Filter string - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - Ldap
Base stringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - Ldap
Bind stringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - Ldap
Bind stringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - Ldap
Cacerts List<string> - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - Ldap
Client stringCert - if
idp_type
==ldap
, LDAPS Client certificate - Ldap
Client stringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- Ldap
Group stringAttr - if
ldap_type
==custom
- Ldap
Group stringDn - if
ldap_type
==custom
- Ldap
Resolve boolGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - Ldap
Server List<string>Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - Ldap
Type string - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- Ldap
User stringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - Member
Filter string - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - Name string
- name
- Oauth
Cc stringClient Id - Required if
idp_type
==oauth
, Client Credentials - Oauth
Cc stringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - Oauth
Discovery stringUrl - if
idp_type
==oauth
- Oauth
Ropc stringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - Oauth
Ropc stringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - Oauth
Tenant stringId - Required if
idp_type
==oauth
, oauthtenantid - Oauth
Type string - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- Idp
Type string - enum:
ldap
,mxedge_proxy
,oauth
- Org
Id string - Group
Filter string - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - Ldap
Base stringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - Ldap
Bind stringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - Ldap
Bind stringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - Ldap
Cacerts []string - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - Ldap
Client stringCert - if
idp_type
==ldap
, LDAPS Client certificate - Ldap
Client stringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- Ldap
Group stringAttr - if
ldap_type
==custom
- Ldap
Group stringDn - if
ldap_type
==custom
- Ldap
Resolve boolGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - Ldap
Server []stringHosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - Ldap
Type string - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- Ldap
User stringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - Member
Filter string - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - Name string
- name
- Oauth
Cc stringClient Id - Required if
idp_type
==oauth
, Client Credentials - Oauth
Cc stringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - Oauth
Discovery stringUrl - if
idp_type
==oauth
- Oauth
Ropc stringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - Oauth
Ropc stringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - Oauth
Tenant stringId - Required if
idp_type
==oauth
, oauthtenantid - Oauth
Type string - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- idp
Type String - enum:
ldap
,mxedge_proxy
,oauth
- org
Id String - group
Filter String - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - ldap
Base StringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap
Bind StringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap
Bind StringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap
Cacerts List<String> - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap
Client StringCert - if
idp_type
==ldap
, LDAPS Client certificate - ldap
Client StringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap
Group StringAttr - if
ldap_type
==custom
- ldap
Group StringDn - if
ldap_type
==custom
- ldap
Resolve BooleanGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap
Server List<String>Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap
Type String - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap
User StringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member
Filter String - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name String
- name
- oauth
Cc StringClient Id - Required if
idp_type
==oauth
, Client Credentials - oauth
Cc StringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth
Discovery StringUrl - if
idp_type
==oauth
- oauth
Ropc StringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth
Ropc StringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth
Tenant StringId - Required if
idp_type
==oauth
, oauthtenantid - oauth
Type String - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- idp
Type string - enum:
ldap
,mxedge_proxy
,oauth
- org
Id string - group
Filter string - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - ldap
Base stringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap
Bind stringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap
Bind stringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap
Cacerts string[] - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap
Client stringCert - if
idp_type
==ldap
, LDAPS Client certificate - ldap
Client stringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap
Group stringAttr - if
ldap_type
==custom
- ldap
Group stringDn - if
ldap_type
==custom
- ldap
Resolve booleanGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap
Server string[]Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap
Type string - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap
User stringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member
Filter string - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name string
- name
- oauth
Cc stringClient Id - Required if
idp_type
==oauth
, Client Credentials - oauth
Cc stringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth
Discovery stringUrl - if
idp_type
==oauth
- oauth
Ropc stringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth
Ropc stringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth
Tenant stringId - Required if
idp_type
==oauth
, oauthtenantid - oauth
Type string - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- idp_
type str - enum:
ldap
,mxedge_proxy
,oauth
- org_
id str - group_
filter str - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - ldap_
base_ strdn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap_
bind_ strdn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap_
bind_ strpassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap_
cacerts Sequence[str] - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap_
client_ strcert - if
idp_type
==ldap
, LDAPS Client certificate - ldap_
client_ strkey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap_
group_ strattr - if
ldap_type
==custom
- ldap_
group_ strdn - if
ldap_type
==custom
- ldap_
resolve_ boolgroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap_
server_ Sequence[str]hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap_
type str - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap_
user_ strfilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member_
filter str - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name str
- name
- oauth_
cc_ strclient_ id - Required if
idp_type
==oauth
, Client Credentials - oauth_
cc_ strclient_ secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth_
discovery_ strurl - if
idp_type
==oauth
- oauth_
ropc_ strclient_ id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth_
ropc_ strclient_ secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth_
tenant_ strid - Required if
idp_type
==oauth
, oauthtenantid - oauth_
type str - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- idp
Type String - enum:
ldap
,mxedge_proxy
,oauth
- org
Id String - group
Filter String - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - ldap
Base StringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap
Bind StringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap
Bind StringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap
Cacerts List<String> - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap
Client StringCert - if
idp_type
==ldap
, LDAPS Client certificate - ldap
Client StringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap
Group StringAttr - if
ldap_type
==custom
- ldap
Group StringDn - if
ldap_type
==custom
- ldap
Resolve BooleanGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap
Server List<String>Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap
Type String - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap
User StringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member
Filter String - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name String
- name
- oauth
Cc StringClient Id - Required if
idp_type
==oauth
, Client Credentials - oauth
Cc StringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth
Discovery StringUrl - if
idp_type
==oauth
- oauth
Ropc StringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth
Ropc StringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth
Tenant StringId - Required if
idp_type
==oauth
, oauthtenantid - oauth
Type String - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
Outputs
All input properties are implicitly available as output properties. Additionally, the Nacidp resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Nacidp Resource
Get an existing Nacidp resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: NacidpState, opts?: CustomResourceOptions): Nacidp
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
group_filter: Optional[str] = None,
idp_type: Optional[str] = None,
ldap_base_dn: Optional[str] = None,
ldap_bind_dn: Optional[str] = None,
ldap_bind_password: Optional[str] = None,
ldap_cacerts: Optional[Sequence[str]] = None,
ldap_client_cert: Optional[str] = None,
ldap_client_key: Optional[str] = None,
ldap_group_attr: Optional[str] = None,
ldap_group_dn: Optional[str] = None,
ldap_resolve_groups: Optional[bool] = None,
ldap_server_hosts: Optional[Sequence[str]] = None,
ldap_type: Optional[str] = None,
ldap_user_filter: Optional[str] = None,
member_filter: Optional[str] = None,
name: Optional[str] = None,
oauth_cc_client_id: Optional[str] = None,
oauth_cc_client_secret: Optional[str] = None,
oauth_discovery_url: Optional[str] = None,
oauth_ropc_client_id: Optional[str] = None,
oauth_ropc_client_secret: Optional[str] = None,
oauth_tenant_id: Optional[str] = None,
oauth_type: Optional[str] = None,
org_id: Optional[str] = None) -> Nacidp
func GetNacidp(ctx *Context, name string, id IDInput, state *NacidpState, opts ...ResourceOption) (*Nacidp, error)
public static Nacidp Get(string name, Input<string> id, NacidpState? state, CustomResourceOptions? opts = null)
public static Nacidp get(String name, Output<String> id, NacidpState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Group
Filter string - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - Idp
Type string - enum:
ldap
,mxedge_proxy
,oauth
- Ldap
Base stringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - Ldap
Bind stringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - Ldap
Bind stringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - Ldap
Cacerts List<string> - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - Ldap
Client stringCert - if
idp_type
==ldap
, LDAPS Client certificate - Ldap
Client stringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- Ldap
Group stringAttr - if
ldap_type
==custom
- Ldap
Group stringDn - if
ldap_type
==custom
- Ldap
Resolve boolGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - Ldap
Server List<string>Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - Ldap
Type string - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- Ldap
User stringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - Member
Filter string - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - Name string
- name
- Oauth
Cc stringClient Id - Required if
idp_type
==oauth
, Client Credentials - Oauth
Cc stringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - Oauth
Discovery stringUrl - if
idp_type
==oauth
- Oauth
Ropc stringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - Oauth
Ropc stringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - Oauth
Tenant stringId - Required if
idp_type
==oauth
, oauthtenantid - Oauth
Type string - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- Org
Id string
- Group
Filter string - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - Idp
Type string - enum:
ldap
,mxedge_proxy
,oauth
- Ldap
Base stringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - Ldap
Bind stringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - Ldap
Bind stringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - Ldap
Cacerts []string - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - Ldap
Client stringCert - if
idp_type
==ldap
, LDAPS Client certificate - Ldap
Client stringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- Ldap
Group stringAttr - if
ldap_type
==custom
- Ldap
Group stringDn - if
ldap_type
==custom
- Ldap
Resolve boolGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - Ldap
Server []stringHosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - Ldap
Type string - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- Ldap
User stringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - Member
Filter string - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - Name string
- name
- Oauth
Cc stringClient Id - Required if
idp_type
==oauth
, Client Credentials - Oauth
Cc stringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - Oauth
Discovery stringUrl - if
idp_type
==oauth
- Oauth
Ropc stringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - Oauth
Ropc stringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - Oauth
Tenant stringId - Required if
idp_type
==oauth
, oauthtenantid - Oauth
Type string - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- Org
Id string
- group
Filter String - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - idp
Type String - enum:
ldap
,mxedge_proxy
,oauth
- ldap
Base StringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap
Bind StringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap
Bind StringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap
Cacerts List<String> - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap
Client StringCert - if
idp_type
==ldap
, LDAPS Client certificate - ldap
Client StringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap
Group StringAttr - if
ldap_type
==custom
- ldap
Group StringDn - if
ldap_type
==custom
- ldap
Resolve BooleanGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap
Server List<String>Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap
Type String - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap
User StringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member
Filter String - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name String
- name
- oauth
Cc StringClient Id - Required if
idp_type
==oauth
, Client Credentials - oauth
Cc StringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth
Discovery StringUrl - if
idp_type
==oauth
- oauth
Ropc StringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth
Ropc StringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth
Tenant StringId - Required if
idp_type
==oauth
, oauthtenantid - oauth
Type String - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- org
Id String
- group
Filter string - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - idp
Type string - enum:
ldap
,mxedge_proxy
,oauth
- ldap
Base stringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap
Bind stringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap
Bind stringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap
Cacerts string[] - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap
Client stringCert - if
idp_type
==ldap
, LDAPS Client certificate - ldap
Client stringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap
Group stringAttr - if
ldap_type
==custom
- ldap
Group stringDn - if
ldap_type
==custom
- ldap
Resolve booleanGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap
Server string[]Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap
Type string - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap
User stringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member
Filter string - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name string
- name
- oauth
Cc stringClient Id - Required if
idp_type
==oauth
, Client Credentials - oauth
Cc stringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth
Discovery stringUrl - if
idp_type
==oauth
- oauth
Ropc stringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth
Ropc stringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth
Tenant stringId - Required if
idp_type
==oauth
, oauthtenantid - oauth
Type string - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- org
Id string
- group_
filter str - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - idp_
type str - enum:
ldap
,mxedge_proxy
,oauth
- ldap_
base_ strdn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap_
bind_ strdn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap_
bind_ strpassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap_
cacerts Sequence[str] - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap_
client_ strcert - if
idp_type
==ldap
, LDAPS Client certificate - ldap_
client_ strkey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap_
group_ strattr - if
ldap_type
==custom
- ldap_
group_ strdn - if
ldap_type
==custom
- ldap_
resolve_ boolgroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap_
server_ Sequence[str]hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap_
type str - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap_
user_ strfilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member_
filter str - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name str
- name
- oauth_
cc_ strclient_ id - Required if
idp_type
==oauth
, Client Credentials - oauth_
cc_ strclient_ secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth_
discovery_ strurl - if
idp_type
==oauth
- oauth_
ropc_ strclient_ id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth_
ropc_ strclient_ secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth_
tenant_ strid - Required if
idp_type
==oauth
, oauthtenantid - oauth_
type str - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- org_
id str
- group
Filter String - Required if
ldap_type
==custom
, LDAP filter that will identify the type of group - idp
Type String - enum:
ldap
,mxedge_proxy
,oauth
- ldap
Base StringDn - Required if
idp_type
==ldap
, whole domain or a specific organization unit (container) in Search base to specify where users and groups are found in the LDAP tree - ldap
Bind StringDn - Required if
idp_type
==ldap
, the account used to authenticate against the LDAP - ldap
Bind StringPassword - Required if
idp_type
==ldap
, the password used to authenticate against the LDAP - ldap
Cacerts List<String> - Required if
idp_type
==ldap
, list of CA certificates to validate the LDAP certificate - ldap
Client StringCert - if
idp_type
==ldap
, LDAPS Client certificate - ldap
Client StringKey - if
idp_type
==ldap
, Key for theldap_client_cert
- ldap
Group StringAttr - if
ldap_type
==custom
- ldap
Group StringDn - if
ldap_type
==custom
- ldap
Resolve BooleanGroups - if
idp_type
==ldap
, whether to recursively resolve LDAP groups - ldap
Server List<String>Hosts - if
idp_type
==ldap
, list of LDAP/LDAPS server IP Addresses or Hostnames - ldap
Type String - if
idp_type
==ldap
. enum:azure
,custom
,google
,okta
,ping_identity
- ldap
User StringFilter - Required if
ldap_type
==custom
, LDAP filter that will identify the type of user - member
Filter String - Required if
ldap_type
==custom
,LDAP filter that will identify the type of member - name String
- name
- oauth
Cc StringClient Id - Required if
idp_type
==oauth
, Client Credentials - oauth
Cc StringClient Secret - Required if
idp_type
==oauth
, oauthccclient_secret is RSA private key, of the form "-----BEGIN RSA PRIVATE KEY--...." - oauth
Discovery StringUrl - if
idp_type
==oauth
- oauth
Ropc StringClient Id - if
idp_type
==oauth
, ropc = Resource Owner Password Credentials - oauth
Ropc StringClient Secret - if
oauth_type
==azure
oroauth_type
==azure-gov
. oauthropcclient_secret can be empty - oauth
Tenant StringId - Required if
idp_type
==oauth
, oauthtenantid - oauth
Type String - if
idp_type
==oauth
. enum:azure
,azure-gov
,okta
,ping_identity
- org
Id String
Import
Using pulumi import
, import mist_org_nacidp
with:
Org PSK can be imported by specifying the org_id and the nacidp_id
$ pulumi import junipermist:org/nacidp:Nacidp idp_azure 17b46405-3a6d-4715-8bb4-6bb6d06f316a.d3c42998-9012-4859-9743-6b9bee475309
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- junipermist pulumi/pulumi-junipermist
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
mist
Terraform Provider.