1. Packages
  2. Okta Provider
  3. API Docs
  4. PolicyMfaDefault
Okta v4.11.3 published on Monday, Oct 21, 2024 by Pulumi

okta.PolicyMfaDefault

Explore with Pulumi AI

okta logo
Okta v4.11.3 published on Monday, Oct 21, 2024 by Pulumi

    Configures default MFA Policy. This resource allows you to configure default MFA Policy.

    Requires Org Feature Flag ‘OKTA_MFA_POLICY’. Contact support to have this feature flag enabled. Unless Org Feature Flag ‘ENG_ENABLE_OPTIONAL_PASSWORD_ENROLLMENT’ is disabled ‘okta_password’ or ‘okta_email’ must be present and its ’enroll’ value set to ‘REQUIRED’. Contact support to have this feature flag disabled.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as okta from "@pulumi/okta";
    
    const classicExample = new okta.PolicyMfaDefault("classic_example", {
        isOie: false,
        oktaPassword: {
            enroll: "REQUIRED",
        },
        oktaOtp: {
            enroll: "REQUIRED",
        },
    });
    const oieExample = new okta.PolicyMfaDefault("oie_example", {
        isOie: true,
        oktaPassword: {
            enroll: "REQUIRED",
        },
        oktaVerify: {
            enroll: "REQUIRED",
        },
    });
    
    import pulumi
    import pulumi_okta as okta
    
    classic_example = okta.PolicyMfaDefault("classic_example",
        is_oie=False,
        okta_password={
            "enroll": "REQUIRED",
        },
        okta_otp={
            "enroll": "REQUIRED",
        })
    oie_example = okta.PolicyMfaDefault("oie_example",
        is_oie=True,
        okta_password={
            "enroll": "REQUIRED",
        },
        okta_verify={
            "enroll": "REQUIRED",
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-okta/sdk/v4/go/okta"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := okta.NewPolicyMfaDefault(ctx, "classic_example", &okta.PolicyMfaDefaultArgs{
    			IsOie: pulumi.Bool(false),
    			OktaPassword: pulumi.StringMap{
    				"enroll": pulumi.String("REQUIRED"),
    			},
    			OktaOtp: pulumi.StringMap{
    				"enroll": pulumi.String("REQUIRED"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = okta.NewPolicyMfaDefault(ctx, "oie_example", &okta.PolicyMfaDefaultArgs{
    			IsOie: pulumi.Bool(true),
    			OktaPassword: pulumi.StringMap{
    				"enroll": pulumi.String("REQUIRED"),
    			},
    			OktaVerify: pulumi.StringMap{
    				"enroll": pulumi.String("REQUIRED"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Okta = Pulumi.Okta;
    
    return await Deployment.RunAsync(() => 
    {
        var classicExample = new Okta.PolicyMfaDefault("classic_example", new()
        {
            IsOie = false,
            OktaPassword = 
            {
                { "enroll", "REQUIRED" },
            },
            OktaOtp = 
            {
                { "enroll", "REQUIRED" },
            },
        });
    
        var oieExample = new Okta.PolicyMfaDefault("oie_example", new()
        {
            IsOie = true,
            OktaPassword = 
            {
                { "enroll", "REQUIRED" },
            },
            OktaVerify = 
            {
                { "enroll", "REQUIRED" },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.okta.PolicyMfaDefault;
    import com.pulumi.okta.PolicyMfaDefaultArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var classicExample = new PolicyMfaDefault("classicExample", PolicyMfaDefaultArgs.builder()
                .isOie(false)
                .oktaPassword(Map.of("enroll", "REQUIRED"))
                .oktaOtp(Map.of("enroll", "REQUIRED"))
                .build());
    
            var oieExample = new PolicyMfaDefault("oieExample", PolicyMfaDefaultArgs.builder()
                .isOie(true)
                .oktaPassword(Map.of("enroll", "REQUIRED"))
                .oktaVerify(Map.of("enroll", "REQUIRED"))
                .build());
    
        }
    }
    
    resources:
      classicExample:
        type: okta:PolicyMfaDefault
        name: classic_example
        properties:
          isOie: false
          oktaPassword:
            enroll: REQUIRED
          oktaOtp:
            enroll: REQUIRED
      oieExample:
        type: okta:PolicyMfaDefault
        name: oie_example
        properties:
          isOie: true
          oktaPassword:
            enroll: REQUIRED
          oktaVerify:
            enroll: REQUIRED
    

    Create PolicyMfaDefault Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new PolicyMfaDefault(name: string, args?: PolicyMfaDefaultArgs, opts?: CustomResourceOptions);
    @overload
    def PolicyMfaDefault(resource_name: str,
                         args: Optional[PolicyMfaDefaultArgs] = None,
                         opts: Optional[ResourceOptions] = None)
    
    @overload
    def PolicyMfaDefault(resource_name: str,
                         opts: Optional[ResourceOptions] = None,
                         duo: Optional[Mapping[str, str]] = None,
                         external_idp: Optional[Mapping[str, str]] = None,
                         external_idps: Optional[Sequence[Mapping[str, str]]] = None,
                         fido_u2f: Optional[Mapping[str, str]] = None,
                         fido_webauthn: Optional[Mapping[str, str]] = None,
                         google_otp: Optional[Mapping[str, str]] = None,
                         hotp: Optional[Mapping[str, str]] = None,
                         is_oie: Optional[bool] = None,
                         okta_call: Optional[Mapping[str, str]] = None,
                         okta_email: Optional[Mapping[str, str]] = None,
                         okta_otp: Optional[Mapping[str, str]] = None,
                         okta_password: Optional[Mapping[str, str]] = None,
                         okta_push: Optional[Mapping[str, str]] = None,
                         okta_question: Optional[Mapping[str, str]] = None,
                         okta_sms: Optional[Mapping[str, str]] = None,
                         okta_verify: Optional[Mapping[str, str]] = None,
                         onprem_mfa: Optional[Mapping[str, str]] = None,
                         phone_number: Optional[Mapping[str, str]] = None,
                         rsa_token: Optional[Mapping[str, str]] = None,
                         security_question: Optional[Mapping[str, str]] = None,
                         symantec_vip: Optional[Mapping[str, str]] = None,
                         webauthn: Optional[Mapping[str, str]] = None,
                         yubikey_token: Optional[Mapping[str, str]] = None)
    func NewPolicyMfaDefault(ctx *Context, name string, args *PolicyMfaDefaultArgs, opts ...ResourceOption) (*PolicyMfaDefault, error)
    public PolicyMfaDefault(string name, PolicyMfaDefaultArgs? args = null, CustomResourceOptions? opts = null)
    public PolicyMfaDefault(String name, PolicyMfaDefaultArgs args)
    public PolicyMfaDefault(String name, PolicyMfaDefaultArgs args, CustomResourceOptions options)
    
    type: okta:PolicyMfaDefault
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args PolicyMfaDefaultArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args PolicyMfaDefaultArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args PolicyMfaDefaultArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args PolicyMfaDefaultArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args PolicyMfaDefaultArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var policyMfaDefaultResource = new Okta.PolicyMfaDefault("policyMfaDefaultResource", new()
    {
        Duo = 
        {
            { "string", "string" },
        },
        ExternalIdps = new[]
        {
            
            {
                { "string", "string" },
            },
        },
        FidoU2f = 
        {
            { "string", "string" },
        },
        FidoWebauthn = 
        {
            { "string", "string" },
        },
        GoogleOtp = 
        {
            { "string", "string" },
        },
        Hotp = 
        {
            { "string", "string" },
        },
        IsOie = false,
        OktaCall = 
        {
            { "string", "string" },
        },
        OktaEmail = 
        {
            { "string", "string" },
        },
        OktaOtp = 
        {
            { "string", "string" },
        },
        OktaPassword = 
        {
            { "string", "string" },
        },
        OktaPush = 
        {
            { "string", "string" },
        },
        OktaQuestion = 
        {
            { "string", "string" },
        },
        OktaSms = 
        {
            { "string", "string" },
        },
        OktaVerify = 
        {
            { "string", "string" },
        },
        OnpremMfa = 
        {
            { "string", "string" },
        },
        PhoneNumber = 
        {
            { "string", "string" },
        },
        RsaToken = 
        {
            { "string", "string" },
        },
        SecurityQuestion = 
        {
            { "string", "string" },
        },
        SymantecVip = 
        {
            { "string", "string" },
        },
        Webauthn = 
        {
            { "string", "string" },
        },
        YubikeyToken = 
        {
            { "string", "string" },
        },
    });
    
    example, err := okta.NewPolicyMfaDefault(ctx, "policyMfaDefaultResource", &okta.PolicyMfaDefaultArgs{
    	Duo: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	ExternalIdps: pulumi.StringMapArray{
    		pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    	},
    	FidoU2f: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	FidoWebauthn: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	GoogleOtp: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Hotp: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	IsOie: pulumi.Bool(false),
    	OktaCall: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OktaEmail: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OktaOtp: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OktaPassword: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OktaPush: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OktaQuestion: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OktaSms: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OktaVerify: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	OnpremMfa: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	PhoneNumber: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	RsaToken: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	SecurityQuestion: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	SymantecVip: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Webauthn: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	YubikeyToken: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    })
    
    var policyMfaDefaultResource = new PolicyMfaDefault("policyMfaDefaultResource", PolicyMfaDefaultArgs.builder()
        .duo(Map.of("string", "string"))
        .externalIdps(Map.of("string", "string"))
        .fidoU2f(Map.of("string", "string"))
        .fidoWebauthn(Map.of("string", "string"))
        .googleOtp(Map.of("string", "string"))
        .hotp(Map.of("string", "string"))
        .isOie(false)
        .oktaCall(Map.of("string", "string"))
        .oktaEmail(Map.of("string", "string"))
        .oktaOtp(Map.of("string", "string"))
        .oktaPassword(Map.of("string", "string"))
        .oktaPush(Map.of("string", "string"))
        .oktaQuestion(Map.of("string", "string"))
        .oktaSms(Map.of("string", "string"))
        .oktaVerify(Map.of("string", "string"))
        .onpremMfa(Map.of("string", "string"))
        .phoneNumber(Map.of("string", "string"))
        .rsaToken(Map.of("string", "string"))
        .securityQuestion(Map.of("string", "string"))
        .symantecVip(Map.of("string", "string"))
        .webauthn(Map.of("string", "string"))
        .yubikeyToken(Map.of("string", "string"))
        .build());
    
    policy_mfa_default_resource = okta.PolicyMfaDefault("policyMfaDefaultResource",
        duo={
            "string": "string",
        },
        external_idps=[{
            "string": "string",
        }],
        fido_u2f={
            "string": "string",
        },
        fido_webauthn={
            "string": "string",
        },
        google_otp={
            "string": "string",
        },
        hotp={
            "string": "string",
        },
        is_oie=False,
        okta_call={
            "string": "string",
        },
        okta_email={
            "string": "string",
        },
        okta_otp={
            "string": "string",
        },
        okta_password={
            "string": "string",
        },
        okta_push={
            "string": "string",
        },
        okta_question={
            "string": "string",
        },
        okta_sms={
            "string": "string",
        },
        okta_verify={
            "string": "string",
        },
        onprem_mfa={
            "string": "string",
        },
        phone_number={
            "string": "string",
        },
        rsa_token={
            "string": "string",
        },
        security_question={
            "string": "string",
        },
        symantec_vip={
            "string": "string",
        },
        webauthn={
            "string": "string",
        },
        yubikey_token={
            "string": "string",
        })
    
    const policyMfaDefaultResource = new okta.PolicyMfaDefault("policyMfaDefaultResource", {
        duo: {
            string: "string",
        },
        externalIdps: [{
            string: "string",
        }],
        fidoU2f: {
            string: "string",
        },
        fidoWebauthn: {
            string: "string",
        },
        googleOtp: {
            string: "string",
        },
        hotp: {
            string: "string",
        },
        isOie: false,
        oktaCall: {
            string: "string",
        },
        oktaEmail: {
            string: "string",
        },
        oktaOtp: {
            string: "string",
        },
        oktaPassword: {
            string: "string",
        },
        oktaPush: {
            string: "string",
        },
        oktaQuestion: {
            string: "string",
        },
        oktaSms: {
            string: "string",
        },
        oktaVerify: {
            string: "string",
        },
        onpremMfa: {
            string: "string",
        },
        phoneNumber: {
            string: "string",
        },
        rsaToken: {
            string: "string",
        },
        securityQuestion: {
            string: "string",
        },
        symantecVip: {
            string: "string",
        },
        webauthn: {
            string: "string",
        },
        yubikeyToken: {
            string: "string",
        },
    });
    
    type: okta:PolicyMfaDefault
    properties:
        duo:
            string: string
        externalIdps:
            - string: string
        fidoU2f:
            string: string
        fidoWebauthn:
            string: string
        googleOtp:
            string: string
        hotp:
            string: string
        isOie: false
        oktaCall:
            string: string
        oktaEmail:
            string: string
        oktaOtp:
            string: string
        oktaPassword:
            string: string
        oktaPush:
            string: string
        oktaQuestion:
            string: string
        oktaSms:
            string: string
        oktaVerify:
            string: string
        onpremMfa:
            string: string
        phoneNumber:
            string: string
        rsaToken:
            string: string
        securityQuestion:
            string: string
        symantecVip:
            string: string
        webauthn:
            string: string
        yubikeyToken:
            string: string
    

    PolicyMfaDefault Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The PolicyMfaDefault resource accepts the following input properties:

    Duo Dictionary<string, string>
    ExternalIdp Dictionary<string, string>

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    ExternalIdps List<ImmutableDictionary<string, string>>
    FidoU2f Dictionary<string, string>
    FidoWebauthn Dictionary<string, string>
    GoogleOtp Dictionary<string, string>
    Hotp Dictionary<string, string>
    IsOie bool
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    OktaCall Dictionary<string, string>
    OktaEmail Dictionary<string, string>
    OktaOtp Dictionary<string, string>
    OktaPassword Dictionary<string, string>
    OktaPush Dictionary<string, string>
    OktaQuestion Dictionary<string, string>
    OktaSms Dictionary<string, string>
    OktaVerify Dictionary<string, string>
    OnpremMfa Dictionary<string, string>
    PhoneNumber Dictionary<string, string>
    RsaToken Dictionary<string, string>
    SecurityQuestion Dictionary<string, string>
    SymantecVip Dictionary<string, string>
    Webauthn Dictionary<string, string>
    YubikeyToken Dictionary<string, string>
    Duo map[string]string
    ExternalIdp map[string]string

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    ExternalIdps []map[string]string
    FidoU2f map[string]string
    FidoWebauthn map[string]string
    GoogleOtp map[string]string
    Hotp map[string]string
    IsOie bool
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    OktaCall map[string]string
    OktaEmail map[string]string
    OktaOtp map[string]string
    OktaPassword map[string]string
    OktaPush map[string]string
    OktaQuestion map[string]string
    OktaSms map[string]string
    OktaVerify map[string]string
    OnpremMfa map[string]string
    PhoneNumber map[string]string
    RsaToken map[string]string
    SecurityQuestion map[string]string
    SymantecVip map[string]string
    Webauthn map[string]string
    YubikeyToken map[string]string
    duo Map<String,String>
    externalIdp Map<String,String>

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    externalIdps List<Map<String,String>>
    fidoU2f Map<String,String>
    fidoWebauthn Map<String,String>
    googleOtp Map<String,String>
    hotp Map<String,String>
    isOie Boolean
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    oktaCall Map<String,String>
    oktaEmail Map<String,String>
    oktaOtp Map<String,String>
    oktaPassword Map<String,String>
    oktaPush Map<String,String>
    oktaQuestion Map<String,String>
    oktaSms Map<String,String>
    oktaVerify Map<String,String>
    onpremMfa Map<String,String>
    phoneNumber Map<String,String>
    rsaToken Map<String,String>
    securityQuestion Map<String,String>
    symantecVip Map<String,String>
    webauthn Map<String,String>
    yubikeyToken Map<String,String>
    duo {[key: string]: string}
    externalIdp {[key: string]: string}

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    externalIdps {[key: string]: string}[]
    fidoU2f {[key: string]: string}
    fidoWebauthn {[key: string]: string}
    googleOtp {[key: string]: string}
    hotp {[key: string]: string}
    isOie boolean
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    oktaCall {[key: string]: string}
    oktaEmail {[key: string]: string}
    oktaOtp {[key: string]: string}
    oktaPassword {[key: string]: string}
    oktaPush {[key: string]: string}
    oktaQuestion {[key: string]: string}
    oktaSms {[key: string]: string}
    oktaVerify {[key: string]: string}
    onpremMfa {[key: string]: string}
    phoneNumber {[key: string]: string}
    rsaToken {[key: string]: string}
    securityQuestion {[key: string]: string}
    symantecVip {[key: string]: string}
    webauthn {[key: string]: string}
    yubikeyToken {[key: string]: string}
    duo Mapping[str, str]
    external_idp Mapping[str, str]

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    external_idps Sequence[Mapping[str, str]]
    fido_u2f Mapping[str, str]
    fido_webauthn Mapping[str, str]
    google_otp Mapping[str, str]
    hotp Mapping[str, str]
    is_oie bool
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    okta_call Mapping[str, str]
    okta_email Mapping[str, str]
    okta_otp Mapping[str, str]
    okta_password Mapping[str, str]
    okta_push Mapping[str, str]
    okta_question Mapping[str, str]
    okta_sms Mapping[str, str]
    okta_verify Mapping[str, str]
    onprem_mfa Mapping[str, str]
    phone_number Mapping[str, str]
    rsa_token Mapping[str, str]
    security_question Mapping[str, str]
    symantec_vip Mapping[str, str]
    webauthn Mapping[str, str]
    yubikey_token Mapping[str, str]
    duo Map<String>
    externalIdp Map<String>

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    externalIdps List<Map<String>>
    fidoU2f Map<String>
    fidoWebauthn Map<String>
    googleOtp Map<String>
    hotp Map<String>
    isOie Boolean
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    oktaCall Map<String>
    oktaEmail Map<String>
    oktaOtp Map<String>
    oktaPassword Map<String>
    oktaPush Map<String>
    oktaQuestion Map<String>
    oktaSms Map<String>
    oktaVerify Map<String>
    onpremMfa Map<String>
    phoneNumber Map<String>
    rsaToken Map<String>
    securityQuestion Map<String>
    symantecVip Map<String>
    webauthn Map<String>
    yubikeyToken Map<String>

    Outputs

    All input properties are implicitly available as output properties. Additionally, the PolicyMfaDefault resource produces the following output properties:

    DefaultIncludedGroupId string
    Default group ID (always included)
    Description string
    Default policy description
    Id string
    The provider-assigned unique ID for this managed resource.
    Name string
    Default policy name
    Priority int
    Default policy priority
    Status string
    Default policy status
    DefaultIncludedGroupId string
    Default group ID (always included)
    Description string
    Default policy description
    Id string
    The provider-assigned unique ID for this managed resource.
    Name string
    Default policy name
    Priority int
    Default policy priority
    Status string
    Default policy status
    defaultIncludedGroupId String
    Default group ID (always included)
    description String
    Default policy description
    id String
    The provider-assigned unique ID for this managed resource.
    name String
    Default policy name
    priority Integer
    Default policy priority
    status String
    Default policy status
    defaultIncludedGroupId string
    Default group ID (always included)
    description string
    Default policy description
    id string
    The provider-assigned unique ID for this managed resource.
    name string
    Default policy name
    priority number
    Default policy priority
    status string
    Default policy status
    default_included_group_id str
    Default group ID (always included)
    description str
    Default policy description
    id str
    The provider-assigned unique ID for this managed resource.
    name str
    Default policy name
    priority int
    Default policy priority
    status str
    Default policy status
    defaultIncludedGroupId String
    Default group ID (always included)
    description String
    Default policy description
    id String
    The provider-assigned unique ID for this managed resource.
    name String
    Default policy name
    priority Number
    Default policy priority
    status String
    Default policy status

    Look up Existing PolicyMfaDefault Resource

    Get an existing PolicyMfaDefault resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: PolicyMfaDefaultState, opts?: CustomResourceOptions): PolicyMfaDefault
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            default_included_group_id: Optional[str] = None,
            description: Optional[str] = None,
            duo: Optional[Mapping[str, str]] = None,
            external_idp: Optional[Mapping[str, str]] = None,
            external_idps: Optional[Sequence[Mapping[str, str]]] = None,
            fido_u2f: Optional[Mapping[str, str]] = None,
            fido_webauthn: Optional[Mapping[str, str]] = None,
            google_otp: Optional[Mapping[str, str]] = None,
            hotp: Optional[Mapping[str, str]] = None,
            is_oie: Optional[bool] = None,
            name: Optional[str] = None,
            okta_call: Optional[Mapping[str, str]] = None,
            okta_email: Optional[Mapping[str, str]] = None,
            okta_otp: Optional[Mapping[str, str]] = None,
            okta_password: Optional[Mapping[str, str]] = None,
            okta_push: Optional[Mapping[str, str]] = None,
            okta_question: Optional[Mapping[str, str]] = None,
            okta_sms: Optional[Mapping[str, str]] = None,
            okta_verify: Optional[Mapping[str, str]] = None,
            onprem_mfa: Optional[Mapping[str, str]] = None,
            phone_number: Optional[Mapping[str, str]] = None,
            priority: Optional[int] = None,
            rsa_token: Optional[Mapping[str, str]] = None,
            security_question: Optional[Mapping[str, str]] = None,
            status: Optional[str] = None,
            symantec_vip: Optional[Mapping[str, str]] = None,
            webauthn: Optional[Mapping[str, str]] = None,
            yubikey_token: Optional[Mapping[str, str]] = None) -> PolicyMfaDefault
    func GetPolicyMfaDefault(ctx *Context, name string, id IDInput, state *PolicyMfaDefaultState, opts ...ResourceOption) (*PolicyMfaDefault, error)
    public static PolicyMfaDefault Get(string name, Input<string> id, PolicyMfaDefaultState? state, CustomResourceOptions? opts = null)
    public static PolicyMfaDefault get(String name, Output<String> id, PolicyMfaDefaultState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    DefaultIncludedGroupId string
    Default group ID (always included)
    Description string
    Default policy description
    Duo Dictionary<string, string>
    ExternalIdp Dictionary<string, string>

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    ExternalIdps List<ImmutableDictionary<string, string>>
    FidoU2f Dictionary<string, string>
    FidoWebauthn Dictionary<string, string>
    GoogleOtp Dictionary<string, string>
    Hotp Dictionary<string, string>
    IsOie bool
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    Name string
    Default policy name
    OktaCall Dictionary<string, string>
    OktaEmail Dictionary<string, string>
    OktaOtp Dictionary<string, string>
    OktaPassword Dictionary<string, string>
    OktaPush Dictionary<string, string>
    OktaQuestion Dictionary<string, string>
    OktaSms Dictionary<string, string>
    OktaVerify Dictionary<string, string>
    OnpremMfa Dictionary<string, string>
    PhoneNumber Dictionary<string, string>
    Priority int
    Default policy priority
    RsaToken Dictionary<string, string>
    SecurityQuestion Dictionary<string, string>
    Status string
    Default policy status
    SymantecVip Dictionary<string, string>
    Webauthn Dictionary<string, string>
    YubikeyToken Dictionary<string, string>
    DefaultIncludedGroupId string
    Default group ID (always included)
    Description string
    Default policy description
    Duo map[string]string
    ExternalIdp map[string]string

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    ExternalIdps []map[string]string
    FidoU2f map[string]string
    FidoWebauthn map[string]string
    GoogleOtp map[string]string
    Hotp map[string]string
    IsOie bool
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    Name string
    Default policy name
    OktaCall map[string]string
    OktaEmail map[string]string
    OktaOtp map[string]string
    OktaPassword map[string]string
    OktaPush map[string]string
    OktaQuestion map[string]string
    OktaSms map[string]string
    OktaVerify map[string]string
    OnpremMfa map[string]string
    PhoneNumber map[string]string
    Priority int
    Default policy priority
    RsaToken map[string]string
    SecurityQuestion map[string]string
    Status string
    Default policy status
    SymantecVip map[string]string
    Webauthn map[string]string
    YubikeyToken map[string]string
    defaultIncludedGroupId String
    Default group ID (always included)
    description String
    Default policy description
    duo Map<String,String>
    externalIdp Map<String,String>

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    externalIdps List<Map<String,String>>
    fidoU2f Map<String,String>
    fidoWebauthn Map<String,String>
    googleOtp Map<String,String>
    hotp Map<String,String>
    isOie Boolean
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    name String
    Default policy name
    oktaCall Map<String,String>
    oktaEmail Map<String,String>
    oktaOtp Map<String,String>
    oktaPassword Map<String,String>
    oktaPush Map<String,String>
    oktaQuestion Map<String,String>
    oktaSms Map<String,String>
    oktaVerify Map<String,String>
    onpremMfa Map<String,String>
    phoneNumber Map<String,String>
    priority Integer
    Default policy priority
    rsaToken Map<String,String>
    securityQuestion Map<String,String>
    status String
    Default policy status
    symantecVip Map<String,String>
    webauthn Map<String,String>
    yubikeyToken Map<String,String>
    defaultIncludedGroupId string
    Default group ID (always included)
    description string
    Default policy description
    duo {[key: string]: string}
    externalIdp {[key: string]: string}

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    externalIdps {[key: string]: string}[]
    fidoU2f {[key: string]: string}
    fidoWebauthn {[key: string]: string}
    googleOtp {[key: string]: string}
    hotp {[key: string]: string}
    isOie boolean
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    name string
    Default policy name
    oktaCall {[key: string]: string}
    oktaEmail {[key: string]: string}
    oktaOtp {[key: string]: string}
    oktaPassword {[key: string]: string}
    oktaPush {[key: string]: string}
    oktaQuestion {[key: string]: string}
    oktaSms {[key: string]: string}
    oktaVerify {[key: string]: string}
    onpremMfa {[key: string]: string}
    phoneNumber {[key: string]: string}
    priority number
    Default policy priority
    rsaToken {[key: string]: string}
    securityQuestion {[key: string]: string}
    status string
    Default policy status
    symantecVip {[key: string]: string}
    webauthn {[key: string]: string}
    yubikeyToken {[key: string]: string}
    default_included_group_id str
    Default group ID (always included)
    description str
    Default policy description
    duo Mapping[str, str]
    external_idp Mapping[str, str]

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    external_idps Sequence[Mapping[str, str]]
    fido_u2f Mapping[str, str]
    fido_webauthn Mapping[str, str]
    google_otp Mapping[str, str]
    hotp Mapping[str, str]
    is_oie bool
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    name str
    Default policy name
    okta_call Mapping[str, str]
    okta_email Mapping[str, str]
    okta_otp Mapping[str, str]
    okta_password Mapping[str, str]
    okta_push Mapping[str, str]
    okta_question Mapping[str, str]
    okta_sms Mapping[str, str]
    okta_verify Mapping[str, str]
    onprem_mfa Mapping[str, str]
    phone_number Mapping[str, str]
    priority int
    Default policy priority
    rsa_token Mapping[str, str]
    security_question Mapping[str, str]
    status str
    Default policy status
    symantec_vip Mapping[str, str]
    webauthn Mapping[str, str]
    yubikey_token Mapping[str, str]
    defaultIncludedGroupId String
    Default group ID (always included)
    description String
    Default policy description
    duo Map<String>
    externalIdp Map<String>

    Deprecated: Since okta now support multiple external_idps, this will be deprecated. Please use external_idps instead

    externalIdps List<Map<String>>
    fidoU2f Map<String>
    fidoWebauthn Map<String>
    googleOtp Map<String>
    hotp Map<String>
    isOie Boolean
    Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
    name String
    Default policy name
    oktaCall Map<String>
    oktaEmail Map<String>
    oktaOtp Map<String>
    oktaPassword Map<String>
    oktaPush Map<String>
    oktaQuestion Map<String>
    oktaSms Map<String>
    oktaVerify Map<String>
    onpremMfa Map<String>
    phoneNumber Map<String>
    priority Number
    Default policy priority
    rsaToken Map<String>
    securityQuestion Map<String>
    status String
    Default policy status
    symantecVip Map<String>
    webauthn Map<String>
    yubikeyToken Map<String>

    Import

    $ pulumi import okta:index/policyMfaDefault:PolicyMfaDefault example .
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Okta pulumi/pulumi-okta
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the okta Terraform Provider.
    okta logo
    Okta v4.11.3 published on Monday, Oct 21, 2024 by Pulumi