okta.policy.Mfa
Explore with Pulumi AI
Example Usage
Create Mfa Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Mfa(name: string, args?: MfaArgs, opts?: CustomResourceOptions);
@overload
def Mfa(resource_name: str,
args: Optional[MfaArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def Mfa(resource_name: str,
opts: Optional[ResourceOptions] = None,
description: Optional[str] = None,
duo: Optional[Mapping[str, str]] = None,
external_idp: Optional[Mapping[str, str]] = None,
external_idps: Optional[Sequence[Mapping[str, str]]] = None,
fido_u2f: Optional[Mapping[str, str]] = None,
fido_webauthn: Optional[Mapping[str, str]] = None,
google_otp: Optional[Mapping[str, str]] = None,
groups_includeds: Optional[Sequence[str]] = None,
hotp: Optional[Mapping[str, str]] = None,
is_oie: Optional[bool] = None,
name: Optional[str] = None,
okta_call: Optional[Mapping[str, str]] = None,
okta_email: Optional[Mapping[str, str]] = None,
okta_otp: Optional[Mapping[str, str]] = None,
okta_password: Optional[Mapping[str, str]] = None,
okta_push: Optional[Mapping[str, str]] = None,
okta_question: Optional[Mapping[str, str]] = None,
okta_sms: Optional[Mapping[str, str]] = None,
okta_verify: Optional[Mapping[str, str]] = None,
onprem_mfa: Optional[Mapping[str, str]] = None,
phone_number: Optional[Mapping[str, str]] = None,
priority: Optional[int] = None,
rsa_token: Optional[Mapping[str, str]] = None,
security_question: Optional[Mapping[str, str]] = None,
status: Optional[str] = None,
symantec_vip: Optional[Mapping[str, str]] = None,
webauthn: Optional[Mapping[str, str]] = None,
yubikey_token: Optional[Mapping[str, str]] = None)
func NewMfa(ctx *Context, name string, args *MfaArgs, opts ...ResourceOption) (*Mfa, error)
public Mfa(string name, MfaArgs? args = null, CustomResourceOptions? opts = null)
type: okta:policy:Mfa
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args MfaArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args MfaArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args MfaArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args MfaArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args MfaArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var mfaResource = new Okta.Policy.Mfa("mfaResource", new()
{
Description = "string",
Duo =
{
{ "string", "string" },
},
ExternalIdps = new[]
{
{
{ "string", "string" },
},
},
FidoU2f =
{
{ "string", "string" },
},
FidoWebauthn =
{
{ "string", "string" },
},
GoogleOtp =
{
{ "string", "string" },
},
GroupsIncludeds = new[]
{
"string",
},
Hotp =
{
{ "string", "string" },
},
IsOie = false,
Name = "string",
OktaCall =
{
{ "string", "string" },
},
OktaEmail =
{
{ "string", "string" },
},
OktaOtp =
{
{ "string", "string" },
},
OktaPassword =
{
{ "string", "string" },
},
OktaPush =
{
{ "string", "string" },
},
OktaQuestion =
{
{ "string", "string" },
},
OktaSms =
{
{ "string", "string" },
},
OktaVerify =
{
{ "string", "string" },
},
OnpremMfa =
{
{ "string", "string" },
},
PhoneNumber =
{
{ "string", "string" },
},
Priority = 0,
RsaToken =
{
{ "string", "string" },
},
SecurityQuestion =
{
{ "string", "string" },
},
Status = "string",
SymantecVip =
{
{ "string", "string" },
},
Webauthn =
{
{ "string", "string" },
},
YubikeyToken =
{
{ "string", "string" },
},
});
example, err := policy.NewMfa(ctx, "mfaResource", &policy.MfaArgs{
Description: pulumi.String("string"),
Duo: pulumi.StringMap{
"string": pulumi.String("string"),
},
ExternalIdps: pulumi.StringMapArray{
pulumi.StringMap{
"string": pulumi.String("string"),
},
},
FidoU2f: pulumi.StringMap{
"string": pulumi.String("string"),
},
FidoWebauthn: pulumi.StringMap{
"string": pulumi.String("string"),
},
GoogleOtp: pulumi.StringMap{
"string": pulumi.String("string"),
},
GroupsIncludeds: pulumi.StringArray{
pulumi.String("string"),
},
Hotp: pulumi.StringMap{
"string": pulumi.String("string"),
},
IsOie: pulumi.Bool(false),
Name: pulumi.String("string"),
OktaCall: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaEmail: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaOtp: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaPassword: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaPush: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaQuestion: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaSms: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaVerify: pulumi.StringMap{
"string": pulumi.String("string"),
},
OnpremMfa: pulumi.StringMap{
"string": pulumi.String("string"),
},
PhoneNumber: pulumi.StringMap{
"string": pulumi.String("string"),
},
Priority: pulumi.Int(0),
RsaToken: pulumi.StringMap{
"string": pulumi.String("string"),
},
SecurityQuestion: pulumi.StringMap{
"string": pulumi.String("string"),
},
Status: pulumi.String("string"),
SymantecVip: pulumi.StringMap{
"string": pulumi.String("string"),
},
Webauthn: pulumi.StringMap{
"string": pulumi.String("string"),
},
YubikeyToken: pulumi.StringMap{
"string": pulumi.String("string"),
},
})
var mfaResource = new Mfa("mfaResource", MfaArgs.builder()
.description("string")
.duo(Map.of("string", "string"))
.externalIdps(Map.of("string", "string"))
.fidoU2f(Map.of("string", "string"))
.fidoWebauthn(Map.of("string", "string"))
.googleOtp(Map.of("string", "string"))
.groupsIncludeds("string")
.hotp(Map.of("string", "string"))
.isOie(false)
.name("string")
.oktaCall(Map.of("string", "string"))
.oktaEmail(Map.of("string", "string"))
.oktaOtp(Map.of("string", "string"))
.oktaPassword(Map.of("string", "string"))
.oktaPush(Map.of("string", "string"))
.oktaQuestion(Map.of("string", "string"))
.oktaSms(Map.of("string", "string"))
.oktaVerify(Map.of("string", "string"))
.onpremMfa(Map.of("string", "string"))
.phoneNumber(Map.of("string", "string"))
.priority(0)
.rsaToken(Map.of("string", "string"))
.securityQuestion(Map.of("string", "string"))
.status("string")
.symantecVip(Map.of("string", "string"))
.webauthn(Map.of("string", "string"))
.yubikeyToken(Map.of("string", "string"))
.build());
mfa_resource = okta.policy.Mfa("mfaResource",
description="string",
duo={
"string": "string",
},
external_idps=[{
"string": "string",
}],
fido_u2f={
"string": "string",
},
fido_webauthn={
"string": "string",
},
google_otp={
"string": "string",
},
groups_includeds=["string"],
hotp={
"string": "string",
},
is_oie=False,
name="string",
okta_call={
"string": "string",
},
okta_email={
"string": "string",
},
okta_otp={
"string": "string",
},
okta_password={
"string": "string",
},
okta_push={
"string": "string",
},
okta_question={
"string": "string",
},
okta_sms={
"string": "string",
},
okta_verify={
"string": "string",
},
onprem_mfa={
"string": "string",
},
phone_number={
"string": "string",
},
priority=0,
rsa_token={
"string": "string",
},
security_question={
"string": "string",
},
status="string",
symantec_vip={
"string": "string",
},
webauthn={
"string": "string",
},
yubikey_token={
"string": "string",
})
const mfaResource = new okta.policy.Mfa("mfaResource", {
description: "string",
duo: {
string: "string",
},
externalIdps: [{
string: "string",
}],
fidoU2f: {
string: "string",
},
fidoWebauthn: {
string: "string",
},
googleOtp: {
string: "string",
},
groupsIncludeds: ["string"],
hotp: {
string: "string",
},
isOie: false,
name: "string",
oktaCall: {
string: "string",
},
oktaEmail: {
string: "string",
},
oktaOtp: {
string: "string",
},
oktaPassword: {
string: "string",
},
oktaPush: {
string: "string",
},
oktaQuestion: {
string: "string",
},
oktaSms: {
string: "string",
},
oktaVerify: {
string: "string",
},
onpremMfa: {
string: "string",
},
phoneNumber: {
string: "string",
},
priority: 0,
rsaToken: {
string: "string",
},
securityQuestion: {
string: "string",
},
status: "string",
symantecVip: {
string: "string",
},
webauthn: {
string: "string",
},
yubikeyToken: {
string: "string",
},
});
type: okta:policy:Mfa
properties:
description: string
duo:
string: string
externalIdps:
- string: string
fidoU2f:
string: string
fidoWebauthn:
string: string
googleOtp:
string: string
groupsIncludeds:
- string
hotp:
string: string
isOie: false
name: string
oktaCall:
string: string
oktaEmail:
string: string
oktaOtp:
string: string
oktaPassword:
string: string
oktaPush:
string: string
oktaQuestion:
string: string
oktaSms:
string: string
oktaVerify:
string: string
onpremMfa:
string: string
phoneNumber:
string: string
priority: 0
rsaToken:
string: string
securityQuestion:
string: string
status: string
symantecVip:
string: string
webauthn:
string: string
yubikeyToken:
string: string
Mfa Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Mfa resource accepts the following input properties:
- Description string
- Policy Description
- Duo Dictionary<string, string>
- External
Idp Dictionary<string, string> - External
Idps List<ImmutableDictionary<string, string>> - Fido
U2f Dictionary<string, string> - Fido
Webauthn Dictionary<string, string> - Google
Otp Dictionary<string, string> - Groups
Includeds List<string> - List of Group IDs to Include
- Hotp Dictionary<string, string>
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Name string
- Policy Name
- Okta
Call Dictionary<string, string> - Okta
Email Dictionary<string, string> - Okta
Otp Dictionary<string, string> - Okta
Password Dictionary<string, string> - Okta
Push Dictionary<string, string> - Okta
Question Dictionary<string, string> - Okta
Sms Dictionary<string, string> - Okta
Verify Dictionary<string, string> - Onprem
Mfa Dictionary<string, string> - Phone
Number Dictionary<string, string> - Priority int
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- Rsa
Token Dictionary<string, string> - Security
Question Dictionary<string, string> - Status string
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- Symantec
Vip Dictionary<string, string> - Webauthn Dictionary<string, string>
- Yubikey
Token Dictionary<string, string>
- Description string
- Policy Description
- Duo map[string]string
- External
Idp map[string]string - External
Idps []map[string]string - Fido
U2f map[string]string - Fido
Webauthn map[string]string - Google
Otp map[string]string - Groups
Includeds []string - List of Group IDs to Include
- Hotp map[string]string
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Name string
- Policy Name
- Okta
Call map[string]string - Okta
Email map[string]string - Okta
Otp map[string]string - Okta
Password map[string]string - Okta
Push map[string]string - Okta
Question map[string]string - Okta
Sms map[string]string - Okta
Verify map[string]string - Onprem
Mfa map[string]string - Phone
Number map[string]string - Priority int
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- Rsa
Token map[string]string - Security
Question map[string]string - Status string
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- Symantec
Vip map[string]string - Webauthn map[string]string
- Yubikey
Token map[string]string
- description String
- Policy Description
- duo Map<String,String>
- external
Idp Map<String,String> - external
Idps List<Map<String,String>> - fido
U2f Map<String,String> - fido
Webauthn Map<String,String> - google
Otp Map<String,String> - groups
Includeds List<String> - List of Group IDs to Include
- hotp Map<String,String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name String
- Policy Name
- okta
Call Map<String,String> - okta
Email Map<String,String> - okta
Otp Map<String,String> - okta
Password Map<String,String> - okta
Push Map<String,String> - okta
Question Map<String,String> - okta
Sms Map<String,String> - okta
Verify Map<String,String> - onprem
Mfa Map<String,String> - phone
Number Map<String,String> - priority Integer
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa
Token Map<String,String> - security
Question Map<String,String> - status String
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec
Vip Map<String,String> - webauthn Map<String,String>
- yubikey
Token Map<String,String>
- description string
- Policy Description
- duo {[key: string]: string}
- external
Idp {[key: string]: string} - external
Idps {[key: string]: string}[] - fido
U2f {[key: string]: string} - fido
Webauthn {[key: string]: string} - google
Otp {[key: string]: string} - groups
Includeds string[] - List of Group IDs to Include
- hotp {[key: string]: string}
- is
Oie boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name string
- Policy Name
- okta
Call {[key: string]: string} - okta
Email {[key: string]: string} - okta
Otp {[key: string]: string} - okta
Password {[key: string]: string} - okta
Push {[key: string]: string} - okta
Question {[key: string]: string} - okta
Sms {[key: string]: string} - okta
Verify {[key: string]: string} - onprem
Mfa {[key: string]: string} - phone
Number {[key: string]: string} - priority number
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa
Token {[key: string]: string} - security
Question {[key: string]: string} - status string
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec
Vip {[key: string]: string} - webauthn {[key: string]: string}
- yubikey
Token {[key: string]: string}
- description str
- Policy Description
- duo Mapping[str, str]
- external_
idp Mapping[str, str] - external_
idps Sequence[Mapping[str, str]] - fido_
u2f Mapping[str, str] - fido_
webauthn Mapping[str, str] - google_
otp Mapping[str, str] - groups_
includeds Sequence[str] - List of Group IDs to Include
- hotp Mapping[str, str]
- is_
oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name str
- Policy Name
- okta_
call Mapping[str, str] - okta_
email Mapping[str, str] - okta_
otp Mapping[str, str] - okta_
password Mapping[str, str] - okta_
push Mapping[str, str] - okta_
question Mapping[str, str] - okta_
sms Mapping[str, str] - okta_
verify Mapping[str, str] - onprem_
mfa Mapping[str, str] - phone_
number Mapping[str, str] - priority int
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa_
token Mapping[str, str] - security_
question Mapping[str, str] - status str
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec_
vip Mapping[str, str] - webauthn Mapping[str, str]
- yubikey_
token Mapping[str, str]
- description String
- Policy Description
- duo Map<String>
- external
Idp Map<String> - external
Idps List<Map<String>> - fido
U2f Map<String> - fido
Webauthn Map<String> - google
Otp Map<String> - groups
Includeds List<String> - List of Group IDs to Include
- hotp Map<String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name String
- Policy Name
- okta
Call Map<String> - okta
Email Map<String> - okta
Otp Map<String> - okta
Password Map<String> - okta
Push Map<String> - okta
Question Map<String> - okta
Sms Map<String> - okta
Verify Map<String> - onprem
Mfa Map<String> - phone
Number Map<String> - priority Number
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa
Token Map<String> - security
Question Map<String> - status String
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec
Vip Map<String> - webauthn Map<String>
- yubikey
Token Map<String>
Outputs
All input properties are implicitly available as output properties. Additionally, the Mfa resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Mfa Resource
Get an existing Mfa resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: MfaState, opts?: CustomResourceOptions): Mfa
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
description: Optional[str] = None,
duo: Optional[Mapping[str, str]] = None,
external_idp: Optional[Mapping[str, str]] = None,
external_idps: Optional[Sequence[Mapping[str, str]]] = None,
fido_u2f: Optional[Mapping[str, str]] = None,
fido_webauthn: Optional[Mapping[str, str]] = None,
google_otp: Optional[Mapping[str, str]] = None,
groups_includeds: Optional[Sequence[str]] = None,
hotp: Optional[Mapping[str, str]] = None,
is_oie: Optional[bool] = None,
name: Optional[str] = None,
okta_call: Optional[Mapping[str, str]] = None,
okta_email: Optional[Mapping[str, str]] = None,
okta_otp: Optional[Mapping[str, str]] = None,
okta_password: Optional[Mapping[str, str]] = None,
okta_push: Optional[Mapping[str, str]] = None,
okta_question: Optional[Mapping[str, str]] = None,
okta_sms: Optional[Mapping[str, str]] = None,
okta_verify: Optional[Mapping[str, str]] = None,
onprem_mfa: Optional[Mapping[str, str]] = None,
phone_number: Optional[Mapping[str, str]] = None,
priority: Optional[int] = None,
rsa_token: Optional[Mapping[str, str]] = None,
security_question: Optional[Mapping[str, str]] = None,
status: Optional[str] = None,
symantec_vip: Optional[Mapping[str, str]] = None,
webauthn: Optional[Mapping[str, str]] = None,
yubikey_token: Optional[Mapping[str, str]] = None) -> Mfa
func GetMfa(ctx *Context, name string, id IDInput, state *MfaState, opts ...ResourceOption) (*Mfa, error)
public static Mfa Get(string name, Input<string> id, MfaState? state, CustomResourceOptions? opts = null)
public static Mfa get(String name, Output<String> id, MfaState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Description string
- Policy Description
- Duo Dictionary<string, string>
- External
Idp Dictionary<string, string> - External
Idps List<ImmutableDictionary<string, string>> - Fido
U2f Dictionary<string, string> - Fido
Webauthn Dictionary<string, string> - Google
Otp Dictionary<string, string> - Groups
Includeds List<string> - List of Group IDs to Include
- Hotp Dictionary<string, string>
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Name string
- Policy Name
- Okta
Call Dictionary<string, string> - Okta
Email Dictionary<string, string> - Okta
Otp Dictionary<string, string> - Okta
Password Dictionary<string, string> - Okta
Push Dictionary<string, string> - Okta
Question Dictionary<string, string> - Okta
Sms Dictionary<string, string> - Okta
Verify Dictionary<string, string> - Onprem
Mfa Dictionary<string, string> - Phone
Number Dictionary<string, string> - Priority int
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- Rsa
Token Dictionary<string, string> - Security
Question Dictionary<string, string> - Status string
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- Symantec
Vip Dictionary<string, string> - Webauthn Dictionary<string, string>
- Yubikey
Token Dictionary<string, string>
- Description string
- Policy Description
- Duo map[string]string
- External
Idp map[string]string - External
Idps []map[string]string - Fido
U2f map[string]string - Fido
Webauthn map[string]string - Google
Otp map[string]string - Groups
Includeds []string - List of Group IDs to Include
- Hotp map[string]string
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Name string
- Policy Name
- Okta
Call map[string]string - Okta
Email map[string]string - Okta
Otp map[string]string - Okta
Password map[string]string - Okta
Push map[string]string - Okta
Question map[string]string - Okta
Sms map[string]string - Okta
Verify map[string]string - Onprem
Mfa map[string]string - Phone
Number map[string]string - Priority int
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- Rsa
Token map[string]string - Security
Question map[string]string - Status string
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- Symantec
Vip map[string]string - Webauthn map[string]string
- Yubikey
Token map[string]string
- description String
- Policy Description
- duo Map<String,String>
- external
Idp Map<String,String> - external
Idps List<Map<String,String>> - fido
U2f Map<String,String> - fido
Webauthn Map<String,String> - google
Otp Map<String,String> - groups
Includeds List<String> - List of Group IDs to Include
- hotp Map<String,String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name String
- Policy Name
- okta
Call Map<String,String> - okta
Email Map<String,String> - okta
Otp Map<String,String> - okta
Password Map<String,String> - okta
Push Map<String,String> - okta
Question Map<String,String> - okta
Sms Map<String,String> - okta
Verify Map<String,String> - onprem
Mfa Map<String,String> - phone
Number Map<String,String> - priority Integer
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa
Token Map<String,String> - security
Question Map<String,String> - status String
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec
Vip Map<String,String> - webauthn Map<String,String>
- yubikey
Token Map<String,String>
- description string
- Policy Description
- duo {[key: string]: string}
- external
Idp {[key: string]: string} - external
Idps {[key: string]: string}[] - fido
U2f {[key: string]: string} - fido
Webauthn {[key: string]: string} - google
Otp {[key: string]: string} - groups
Includeds string[] - List of Group IDs to Include
- hotp {[key: string]: string}
- is
Oie boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name string
- Policy Name
- okta
Call {[key: string]: string} - okta
Email {[key: string]: string} - okta
Otp {[key: string]: string} - okta
Password {[key: string]: string} - okta
Push {[key: string]: string} - okta
Question {[key: string]: string} - okta
Sms {[key: string]: string} - okta
Verify {[key: string]: string} - onprem
Mfa {[key: string]: string} - phone
Number {[key: string]: string} - priority number
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa
Token {[key: string]: string} - security
Question {[key: string]: string} - status string
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec
Vip {[key: string]: string} - webauthn {[key: string]: string}
- yubikey
Token {[key: string]: string}
- description str
- Policy Description
- duo Mapping[str, str]
- external_
idp Mapping[str, str] - external_
idps Sequence[Mapping[str, str]] - fido_
u2f Mapping[str, str] - fido_
webauthn Mapping[str, str] - google_
otp Mapping[str, str] - groups_
includeds Sequence[str] - List of Group IDs to Include
- hotp Mapping[str, str]
- is_
oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name str
- Policy Name
- okta_
call Mapping[str, str] - okta_
email Mapping[str, str] - okta_
otp Mapping[str, str] - okta_
password Mapping[str, str] - okta_
push Mapping[str, str] - okta_
question Mapping[str, str] - okta_
sms Mapping[str, str] - okta_
verify Mapping[str, str] - onprem_
mfa Mapping[str, str] - phone_
number Mapping[str, str] - priority int
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa_
token Mapping[str, str] - security_
question Mapping[str, str] - status str
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec_
vip Mapping[str, str] - webauthn Mapping[str, str]
- yubikey_
token Mapping[str, str]
- description String
- Policy Description
- duo Map<String>
- external
Idp Map<String> - external
Idps List<Map<String>> - fido
U2f Map<String> - fido
Webauthn Map<String> - google
Otp Map<String> - groups
Includeds List<String> - List of Group IDs to Include
- hotp Map<String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name String
- Policy Name
- okta
Call Map<String> - okta
Email Map<String> - okta
Otp Map<String> - okta
Password Map<String> - okta
Push Map<String> - okta
Question Map<String> - okta
Sms Map<String> - okta
Verify Map<String> - onprem
Mfa Map<String> - phone
Number Map<String> - priority Number
- Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
- rsa
Token Map<String> - security
Question Map<String> - status String
- Policy Status:
ACTIVE
orINACTIVE
. Default:ACTIVE
- symantec
Vip Map<String> - webauthn Map<String>
- yubikey
Token Map<String>
Import
$ pulumi import okta:policy/mfa:Mfa example <policy_id>
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Okta pulumi/pulumi-okta
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
okta
Terraform Provider.