okta.PolicyMfaDefault
Explore with Pulumi AI
Configures default MFA Policy. This resource allows you to configure default MFA Policy.
Requires Org Feature Flag ‘OKTA_MFA_POLICY’. Contact support to have this feature flag enabled. Unless Org Feature Flag ‘ENG_ENABLE_OPTIONAL_PASSWORD_ENROLLMENT’ is disabled ‘okta_password’ or ‘okta_email’ must be present and its ’enroll’ value set to ‘REQUIRED’. Contact support to have this feature flag disabled.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as okta from "@pulumi/okta";
const classicExample = new okta.PolicyMfaDefault("classic_example", {
isOie: false,
oktaPassword: {
enroll: "REQUIRED",
},
oktaOtp: {
enroll: "REQUIRED",
},
});
const oieExample = new okta.PolicyMfaDefault("oie_example", {
isOie: true,
oktaPassword: {
enroll: "REQUIRED",
},
oktaVerify: {
enroll: "REQUIRED",
},
});
import pulumi
import pulumi_okta as okta
classic_example = okta.PolicyMfaDefault("classic_example",
is_oie=False,
okta_password={
"enroll": "REQUIRED",
},
okta_otp={
"enroll": "REQUIRED",
})
oie_example = okta.PolicyMfaDefault("oie_example",
is_oie=True,
okta_password={
"enroll": "REQUIRED",
},
okta_verify={
"enroll": "REQUIRED",
})
package main
import (
"github.com/pulumi/pulumi-okta/sdk/v4/go/okta"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := okta.NewPolicyMfaDefault(ctx, "classic_example", &okta.PolicyMfaDefaultArgs{
IsOie: pulumi.Bool(false),
OktaPassword: pulumi.StringMap{
"enroll": pulumi.String("REQUIRED"),
},
OktaOtp: pulumi.StringMap{
"enroll": pulumi.String("REQUIRED"),
},
})
if err != nil {
return err
}
_, err = okta.NewPolicyMfaDefault(ctx, "oie_example", &okta.PolicyMfaDefaultArgs{
IsOie: pulumi.Bool(true),
OktaPassword: pulumi.StringMap{
"enroll": pulumi.String("REQUIRED"),
},
OktaVerify: pulumi.StringMap{
"enroll": pulumi.String("REQUIRED"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Okta = Pulumi.Okta;
return await Deployment.RunAsync(() =>
{
var classicExample = new Okta.PolicyMfaDefault("classic_example", new()
{
IsOie = false,
OktaPassword =
{
{ "enroll", "REQUIRED" },
},
OktaOtp =
{
{ "enroll", "REQUIRED" },
},
});
var oieExample = new Okta.PolicyMfaDefault("oie_example", new()
{
IsOie = true,
OktaPassword =
{
{ "enroll", "REQUIRED" },
},
OktaVerify =
{
{ "enroll", "REQUIRED" },
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.okta.PolicyMfaDefault;
import com.pulumi.okta.PolicyMfaDefaultArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var classicExample = new PolicyMfaDefault("classicExample", PolicyMfaDefaultArgs.builder()
.isOie(false)
.oktaPassword(Map.of("enroll", "REQUIRED"))
.oktaOtp(Map.of("enroll", "REQUIRED"))
.build());
var oieExample = new PolicyMfaDefault("oieExample", PolicyMfaDefaultArgs.builder()
.isOie(true)
.oktaPassword(Map.of("enroll", "REQUIRED"))
.oktaVerify(Map.of("enroll", "REQUIRED"))
.build());
}
}
resources:
classicExample:
type: okta:PolicyMfaDefault
name: classic_example
properties:
isOie: false
oktaPassword:
enroll: REQUIRED
oktaOtp:
enroll: REQUIRED
oieExample:
type: okta:PolicyMfaDefault
name: oie_example
properties:
isOie: true
oktaPassword:
enroll: REQUIRED
oktaVerify:
enroll: REQUIRED
Create PolicyMfaDefault Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new PolicyMfaDefault(name: string, args?: PolicyMfaDefaultArgs, opts?: CustomResourceOptions);
@overload
def PolicyMfaDefault(resource_name: str,
args: Optional[PolicyMfaDefaultArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def PolicyMfaDefault(resource_name: str,
opts: Optional[ResourceOptions] = None,
duo: Optional[Mapping[str, str]] = None,
external_idp: Optional[Mapping[str, str]] = None,
external_idps: Optional[Sequence[Mapping[str, str]]] = None,
fido_u2f: Optional[Mapping[str, str]] = None,
fido_webauthn: Optional[Mapping[str, str]] = None,
google_otp: Optional[Mapping[str, str]] = None,
hotp: Optional[Mapping[str, str]] = None,
is_oie: Optional[bool] = None,
okta_call: Optional[Mapping[str, str]] = None,
okta_email: Optional[Mapping[str, str]] = None,
okta_otp: Optional[Mapping[str, str]] = None,
okta_password: Optional[Mapping[str, str]] = None,
okta_push: Optional[Mapping[str, str]] = None,
okta_question: Optional[Mapping[str, str]] = None,
okta_sms: Optional[Mapping[str, str]] = None,
okta_verify: Optional[Mapping[str, str]] = None,
onprem_mfa: Optional[Mapping[str, str]] = None,
phone_number: Optional[Mapping[str, str]] = None,
rsa_token: Optional[Mapping[str, str]] = None,
security_question: Optional[Mapping[str, str]] = None,
symantec_vip: Optional[Mapping[str, str]] = None,
webauthn: Optional[Mapping[str, str]] = None,
yubikey_token: Optional[Mapping[str, str]] = None)
func NewPolicyMfaDefault(ctx *Context, name string, args *PolicyMfaDefaultArgs, opts ...ResourceOption) (*PolicyMfaDefault, error)
public PolicyMfaDefault(string name, PolicyMfaDefaultArgs? args = null, CustomResourceOptions? opts = null)
public PolicyMfaDefault(String name, PolicyMfaDefaultArgs args)
public PolicyMfaDefault(String name, PolicyMfaDefaultArgs args, CustomResourceOptions options)
type: okta:PolicyMfaDefault
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args PolicyMfaDefaultArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args PolicyMfaDefaultArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args PolicyMfaDefaultArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args PolicyMfaDefaultArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args PolicyMfaDefaultArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var policyMfaDefaultResource = new Okta.PolicyMfaDefault("policyMfaDefaultResource", new()
{
Duo =
{
{ "string", "string" },
},
ExternalIdps = new[]
{
{
{ "string", "string" },
},
},
FidoU2f =
{
{ "string", "string" },
},
FidoWebauthn =
{
{ "string", "string" },
},
GoogleOtp =
{
{ "string", "string" },
},
Hotp =
{
{ "string", "string" },
},
IsOie = false,
OktaCall =
{
{ "string", "string" },
},
OktaEmail =
{
{ "string", "string" },
},
OktaOtp =
{
{ "string", "string" },
},
OktaPassword =
{
{ "string", "string" },
},
OktaPush =
{
{ "string", "string" },
},
OktaQuestion =
{
{ "string", "string" },
},
OktaSms =
{
{ "string", "string" },
},
OktaVerify =
{
{ "string", "string" },
},
OnpremMfa =
{
{ "string", "string" },
},
PhoneNumber =
{
{ "string", "string" },
},
RsaToken =
{
{ "string", "string" },
},
SecurityQuestion =
{
{ "string", "string" },
},
SymantecVip =
{
{ "string", "string" },
},
Webauthn =
{
{ "string", "string" },
},
YubikeyToken =
{
{ "string", "string" },
},
});
example, err := okta.NewPolicyMfaDefault(ctx, "policyMfaDefaultResource", &okta.PolicyMfaDefaultArgs{
Duo: pulumi.StringMap{
"string": pulumi.String("string"),
},
ExternalIdps: pulumi.StringMapArray{
pulumi.StringMap{
"string": pulumi.String("string"),
},
},
FidoU2f: pulumi.StringMap{
"string": pulumi.String("string"),
},
FidoWebauthn: pulumi.StringMap{
"string": pulumi.String("string"),
},
GoogleOtp: pulumi.StringMap{
"string": pulumi.String("string"),
},
Hotp: pulumi.StringMap{
"string": pulumi.String("string"),
},
IsOie: pulumi.Bool(false),
OktaCall: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaEmail: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaOtp: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaPassword: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaPush: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaQuestion: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaSms: pulumi.StringMap{
"string": pulumi.String("string"),
},
OktaVerify: pulumi.StringMap{
"string": pulumi.String("string"),
},
OnpremMfa: pulumi.StringMap{
"string": pulumi.String("string"),
},
PhoneNumber: pulumi.StringMap{
"string": pulumi.String("string"),
},
RsaToken: pulumi.StringMap{
"string": pulumi.String("string"),
},
SecurityQuestion: pulumi.StringMap{
"string": pulumi.String("string"),
},
SymantecVip: pulumi.StringMap{
"string": pulumi.String("string"),
},
Webauthn: pulumi.StringMap{
"string": pulumi.String("string"),
},
YubikeyToken: pulumi.StringMap{
"string": pulumi.String("string"),
},
})
var policyMfaDefaultResource = new PolicyMfaDefault("policyMfaDefaultResource", PolicyMfaDefaultArgs.builder()
.duo(Map.of("string", "string"))
.externalIdps(Map.of("string", "string"))
.fidoU2f(Map.of("string", "string"))
.fidoWebauthn(Map.of("string", "string"))
.googleOtp(Map.of("string", "string"))
.hotp(Map.of("string", "string"))
.isOie(false)
.oktaCall(Map.of("string", "string"))
.oktaEmail(Map.of("string", "string"))
.oktaOtp(Map.of("string", "string"))
.oktaPassword(Map.of("string", "string"))
.oktaPush(Map.of("string", "string"))
.oktaQuestion(Map.of("string", "string"))
.oktaSms(Map.of("string", "string"))
.oktaVerify(Map.of("string", "string"))
.onpremMfa(Map.of("string", "string"))
.phoneNumber(Map.of("string", "string"))
.rsaToken(Map.of("string", "string"))
.securityQuestion(Map.of("string", "string"))
.symantecVip(Map.of("string", "string"))
.webauthn(Map.of("string", "string"))
.yubikeyToken(Map.of("string", "string"))
.build());
policy_mfa_default_resource = okta.PolicyMfaDefault("policyMfaDefaultResource",
duo={
"string": "string",
},
external_idps=[{
"string": "string",
}],
fido_u2f={
"string": "string",
},
fido_webauthn={
"string": "string",
},
google_otp={
"string": "string",
},
hotp={
"string": "string",
},
is_oie=False,
okta_call={
"string": "string",
},
okta_email={
"string": "string",
},
okta_otp={
"string": "string",
},
okta_password={
"string": "string",
},
okta_push={
"string": "string",
},
okta_question={
"string": "string",
},
okta_sms={
"string": "string",
},
okta_verify={
"string": "string",
},
onprem_mfa={
"string": "string",
},
phone_number={
"string": "string",
},
rsa_token={
"string": "string",
},
security_question={
"string": "string",
},
symantec_vip={
"string": "string",
},
webauthn={
"string": "string",
},
yubikey_token={
"string": "string",
})
const policyMfaDefaultResource = new okta.PolicyMfaDefault("policyMfaDefaultResource", {
duo: {
string: "string",
},
externalIdps: [{
string: "string",
}],
fidoU2f: {
string: "string",
},
fidoWebauthn: {
string: "string",
},
googleOtp: {
string: "string",
},
hotp: {
string: "string",
},
isOie: false,
oktaCall: {
string: "string",
},
oktaEmail: {
string: "string",
},
oktaOtp: {
string: "string",
},
oktaPassword: {
string: "string",
},
oktaPush: {
string: "string",
},
oktaQuestion: {
string: "string",
},
oktaSms: {
string: "string",
},
oktaVerify: {
string: "string",
},
onpremMfa: {
string: "string",
},
phoneNumber: {
string: "string",
},
rsaToken: {
string: "string",
},
securityQuestion: {
string: "string",
},
symantecVip: {
string: "string",
},
webauthn: {
string: "string",
},
yubikeyToken: {
string: "string",
},
});
type: okta:PolicyMfaDefault
properties:
duo:
string: string
externalIdps:
- string: string
fidoU2f:
string: string
fidoWebauthn:
string: string
googleOtp:
string: string
hotp:
string: string
isOie: false
oktaCall:
string: string
oktaEmail:
string: string
oktaOtp:
string: string
oktaPassword:
string: string
oktaPush:
string: string
oktaQuestion:
string: string
oktaSms:
string: string
oktaVerify:
string: string
onpremMfa:
string: string
phoneNumber:
string: string
rsaToken:
string: string
securityQuestion:
string: string
symantecVip:
string: string
webauthn:
string: string
yubikeyToken:
string: string
PolicyMfaDefault Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The PolicyMfaDefault resource accepts the following input properties:
- Duo Dictionary<string, string>
- External
Idp Dictionary<string, string> - External
Idps List<ImmutableDictionary<string, string>> - Fido
U2f Dictionary<string, string> - Fido
Webauthn Dictionary<string, string> - Google
Otp Dictionary<string, string> - Hotp Dictionary<string, string>
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Okta
Call Dictionary<string, string> - Okta
Email Dictionary<string, string> - Okta
Otp Dictionary<string, string> - Okta
Password Dictionary<string, string> - Okta
Push Dictionary<string, string> - Okta
Question Dictionary<string, string> - Okta
Sms Dictionary<string, string> - Okta
Verify Dictionary<string, string> - Onprem
Mfa Dictionary<string, string> - Phone
Number Dictionary<string, string> - Rsa
Token Dictionary<string, string> - Security
Question Dictionary<string, string> - Symantec
Vip Dictionary<string, string> - Webauthn Dictionary<string, string>
- Yubikey
Token Dictionary<string, string>
- Duo map[string]string
- External
Idp map[string]string - External
Idps []map[string]string - Fido
U2f map[string]string - Fido
Webauthn map[string]string - Google
Otp map[string]string - Hotp map[string]string
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Okta
Call map[string]string - Okta
Email map[string]string - Okta
Otp map[string]string - Okta
Password map[string]string - Okta
Push map[string]string - Okta
Question map[string]string - Okta
Sms map[string]string - Okta
Verify map[string]string - Onprem
Mfa map[string]string - Phone
Number map[string]string - Rsa
Token map[string]string - Security
Question map[string]string - Symantec
Vip map[string]string - Webauthn map[string]string
- Yubikey
Token map[string]string
- duo Map<String,String>
- external
Idp Map<String,String> - external
Idps List<Map<String,String>> - fido
U2f Map<String,String> - fido
Webauthn Map<String,String> - google
Otp Map<String,String> - hotp Map<String,String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- okta
Call Map<String,String> - okta
Email Map<String,String> - okta
Otp Map<String,String> - okta
Password Map<String,String> - okta
Push Map<String,String> - okta
Question Map<String,String> - okta
Sms Map<String,String> - okta
Verify Map<String,String> - onprem
Mfa Map<String,String> - phone
Number Map<String,String> - rsa
Token Map<String,String> - security
Question Map<String,String> - symantec
Vip Map<String,String> - webauthn Map<String,String>
- yubikey
Token Map<String,String>
- duo {[key: string]: string}
- external
Idp {[key: string]: string} - external
Idps {[key: string]: string}[] - fido
U2f {[key: string]: string} - fido
Webauthn {[key: string]: string} - google
Otp {[key: string]: string} - hotp {[key: string]: string}
- is
Oie boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- okta
Call {[key: string]: string} - okta
Email {[key: string]: string} - okta
Otp {[key: string]: string} - okta
Password {[key: string]: string} - okta
Push {[key: string]: string} - okta
Question {[key: string]: string} - okta
Sms {[key: string]: string} - okta
Verify {[key: string]: string} - onprem
Mfa {[key: string]: string} - phone
Number {[key: string]: string} - rsa
Token {[key: string]: string} - security
Question {[key: string]: string} - symantec
Vip {[key: string]: string} - webauthn {[key: string]: string}
- yubikey
Token {[key: string]: string}
- duo Mapping[str, str]
- external_
idp Mapping[str, str] - external_
idps Sequence[Mapping[str, str]] - fido_
u2f Mapping[str, str] - fido_
webauthn Mapping[str, str] - google_
otp Mapping[str, str] - hotp Mapping[str, str]
- is_
oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- okta_
call Mapping[str, str] - okta_
email Mapping[str, str] - okta_
otp Mapping[str, str] - okta_
password Mapping[str, str] - okta_
push Mapping[str, str] - okta_
question Mapping[str, str] - okta_
sms Mapping[str, str] - okta_
verify Mapping[str, str] - onprem_
mfa Mapping[str, str] - phone_
number Mapping[str, str] - rsa_
token Mapping[str, str] - security_
question Mapping[str, str] - symantec_
vip Mapping[str, str] - webauthn Mapping[str, str]
- yubikey_
token Mapping[str, str]
- duo Map<String>
- external
Idp Map<String> - external
Idps List<Map<String>> - fido
U2f Map<String> - fido
Webauthn Map<String> - google
Otp Map<String> - hotp Map<String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- okta
Call Map<String> - okta
Email Map<String> - okta
Otp Map<String> - okta
Password Map<String> - okta
Push Map<String> - okta
Question Map<String> - okta
Sms Map<String> - okta
Verify Map<String> - onprem
Mfa Map<String> - phone
Number Map<String> - rsa
Token Map<String> - security
Question Map<String> - symantec
Vip Map<String> - webauthn Map<String>
- yubikey
Token Map<String>
Outputs
All input properties are implicitly available as output properties. Additionally, the PolicyMfaDefault resource produces the following output properties:
- Default
Included stringGroup Id - Default group ID (always included)
- Description string
- Default policy description
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- Default policy name
- Priority int
- Default policy priority
- Status string
- Default policy status
- Default
Included stringGroup Id - Default group ID (always included)
- Description string
- Default policy description
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- Default policy name
- Priority int
- Default policy priority
- Status string
- Default policy status
- default
Included StringGroup Id - Default group ID (always included)
- description String
- Default policy description
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- Default policy name
- priority Integer
- Default policy priority
- status String
- Default policy status
- default
Included stringGroup Id - Default group ID (always included)
- description string
- Default policy description
- id string
- The provider-assigned unique ID for this managed resource.
- name string
- Default policy name
- priority number
- Default policy priority
- status string
- Default policy status
- default_
included_ strgroup_ id - Default group ID (always included)
- description str
- Default policy description
- id str
- The provider-assigned unique ID for this managed resource.
- name str
- Default policy name
- priority int
- Default policy priority
- status str
- Default policy status
- default
Included StringGroup Id - Default group ID (always included)
- description String
- Default policy description
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- Default policy name
- priority Number
- Default policy priority
- status String
- Default policy status
Look up Existing PolicyMfaDefault Resource
Get an existing PolicyMfaDefault resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: PolicyMfaDefaultState, opts?: CustomResourceOptions): PolicyMfaDefault
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
default_included_group_id: Optional[str] = None,
description: Optional[str] = None,
duo: Optional[Mapping[str, str]] = None,
external_idp: Optional[Mapping[str, str]] = None,
external_idps: Optional[Sequence[Mapping[str, str]]] = None,
fido_u2f: Optional[Mapping[str, str]] = None,
fido_webauthn: Optional[Mapping[str, str]] = None,
google_otp: Optional[Mapping[str, str]] = None,
hotp: Optional[Mapping[str, str]] = None,
is_oie: Optional[bool] = None,
name: Optional[str] = None,
okta_call: Optional[Mapping[str, str]] = None,
okta_email: Optional[Mapping[str, str]] = None,
okta_otp: Optional[Mapping[str, str]] = None,
okta_password: Optional[Mapping[str, str]] = None,
okta_push: Optional[Mapping[str, str]] = None,
okta_question: Optional[Mapping[str, str]] = None,
okta_sms: Optional[Mapping[str, str]] = None,
okta_verify: Optional[Mapping[str, str]] = None,
onprem_mfa: Optional[Mapping[str, str]] = None,
phone_number: Optional[Mapping[str, str]] = None,
priority: Optional[int] = None,
rsa_token: Optional[Mapping[str, str]] = None,
security_question: Optional[Mapping[str, str]] = None,
status: Optional[str] = None,
symantec_vip: Optional[Mapping[str, str]] = None,
webauthn: Optional[Mapping[str, str]] = None,
yubikey_token: Optional[Mapping[str, str]] = None) -> PolicyMfaDefault
func GetPolicyMfaDefault(ctx *Context, name string, id IDInput, state *PolicyMfaDefaultState, opts ...ResourceOption) (*PolicyMfaDefault, error)
public static PolicyMfaDefault Get(string name, Input<string> id, PolicyMfaDefaultState? state, CustomResourceOptions? opts = null)
public static PolicyMfaDefault get(String name, Output<String> id, PolicyMfaDefaultState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Default
Included stringGroup Id - Default group ID (always included)
- Description string
- Default policy description
- Duo Dictionary<string, string>
- External
Idp Dictionary<string, string> - External
Idps List<ImmutableDictionary<string, string>> - Fido
U2f Dictionary<string, string> - Fido
Webauthn Dictionary<string, string> - Google
Otp Dictionary<string, string> - Hotp Dictionary<string, string>
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Name string
- Default policy name
- Okta
Call Dictionary<string, string> - Okta
Email Dictionary<string, string> - Okta
Otp Dictionary<string, string> - Okta
Password Dictionary<string, string> - Okta
Push Dictionary<string, string> - Okta
Question Dictionary<string, string> - Okta
Sms Dictionary<string, string> - Okta
Verify Dictionary<string, string> - Onprem
Mfa Dictionary<string, string> - Phone
Number Dictionary<string, string> - Priority int
- Default policy priority
- Rsa
Token Dictionary<string, string> - Security
Question Dictionary<string, string> - Status string
- Default policy status
- Symantec
Vip Dictionary<string, string> - Webauthn Dictionary<string, string>
- Yubikey
Token Dictionary<string, string>
- Default
Included stringGroup Id - Default group ID (always included)
- Description string
- Default policy description
- Duo map[string]string
- External
Idp map[string]string - External
Idps []map[string]string - Fido
U2f map[string]string - Fido
Webauthn map[string]string - Google
Otp map[string]string - Hotp map[string]string
- Is
Oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- Name string
- Default policy name
- Okta
Call map[string]string - Okta
Email map[string]string - Okta
Otp map[string]string - Okta
Password map[string]string - Okta
Push map[string]string - Okta
Question map[string]string - Okta
Sms map[string]string - Okta
Verify map[string]string - Onprem
Mfa map[string]string - Phone
Number map[string]string - Priority int
- Default policy priority
- Rsa
Token map[string]string - Security
Question map[string]string - Status string
- Default policy status
- Symantec
Vip map[string]string - Webauthn map[string]string
- Yubikey
Token map[string]string
- default
Included StringGroup Id - Default group ID (always included)
- description String
- Default policy description
- duo Map<String,String>
- external
Idp Map<String,String> - external
Idps List<Map<String,String>> - fido
U2f Map<String,String> - fido
Webauthn Map<String,String> - google
Otp Map<String,String> - hotp Map<String,String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name String
- Default policy name
- okta
Call Map<String,String> - okta
Email Map<String,String> - okta
Otp Map<String,String> - okta
Password Map<String,String> - okta
Push Map<String,String> - okta
Question Map<String,String> - okta
Sms Map<String,String> - okta
Verify Map<String,String> - onprem
Mfa Map<String,String> - phone
Number Map<String,String> - priority Integer
- Default policy priority
- rsa
Token Map<String,String> - security
Question Map<String,String> - status String
- Default policy status
- symantec
Vip Map<String,String> - webauthn Map<String,String>
- yubikey
Token Map<String,String>
- default
Included stringGroup Id - Default group ID (always included)
- description string
- Default policy description
- duo {[key: string]: string}
- external
Idp {[key: string]: string} - external
Idps {[key: string]: string}[] - fido
U2f {[key: string]: string} - fido
Webauthn {[key: string]: string} - google
Otp {[key: string]: string} - hotp {[key: string]: string}
- is
Oie boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name string
- Default policy name
- okta
Call {[key: string]: string} - okta
Email {[key: string]: string} - okta
Otp {[key: string]: string} - okta
Password {[key: string]: string} - okta
Push {[key: string]: string} - okta
Question {[key: string]: string} - okta
Sms {[key: string]: string} - okta
Verify {[key: string]: string} - onprem
Mfa {[key: string]: string} - phone
Number {[key: string]: string} - priority number
- Default policy priority
- rsa
Token {[key: string]: string} - security
Question {[key: string]: string} - status string
- Default policy status
- symantec
Vip {[key: string]: string} - webauthn {[key: string]: string}
- yubikey
Token {[key: string]: string}
- default_
included_ strgroup_ id - Default group ID (always included)
- description str
- Default policy description
- duo Mapping[str, str]
- external_
idp Mapping[str, str] - external_
idps Sequence[Mapping[str, str]] - fido_
u2f Mapping[str, str] - fido_
webauthn Mapping[str, str] - google_
otp Mapping[str, str] - hotp Mapping[str, str]
- is_
oie bool - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name str
- Default policy name
- okta_
call Mapping[str, str] - okta_
email Mapping[str, str] - okta_
otp Mapping[str, str] - okta_
password Mapping[str, str] - okta_
push Mapping[str, str] - okta_
question Mapping[str, str] - okta_
sms Mapping[str, str] - okta_
verify Mapping[str, str] - onprem_
mfa Mapping[str, str] - phone_
number Mapping[str, str] - priority int
- Default policy priority
- rsa_
token Mapping[str, str] - security_
question Mapping[str, str] - status str
- Default policy status
- symantec_
vip Mapping[str, str] - webauthn Mapping[str, str]
- yubikey_
token Mapping[str, str]
- default
Included StringGroup Id - Default group ID (always included)
- description String
- Default policy description
- duo Map<String>
- external
Idp Map<String> - external
Idps List<Map<String>> - fido
U2f Map<String> - fido
Webauthn Map<String> - google
Otp Map<String> - hotp Map<String>
- is
Oie Boolean - Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
- name String
- Default policy name
- okta
Call Map<String> - okta
Email Map<String> - okta
Otp Map<String> - okta
Password Map<String> - okta
Push Map<String> - okta
Question Map<String> - okta
Sms Map<String> - okta
Verify Map<String> - onprem
Mfa Map<String> - phone
Number Map<String> - priority Number
- Default policy priority
- rsa
Token Map<String> - security
Question Map<String> - status String
- Default policy status
- symantec
Vip Map<String> - webauthn Map<String>
- yubikey
Token Map<String>
Import
$ pulumi import okta:index/policyMfaDefault:PolicyMfaDefault example .
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Okta pulumi/pulumi-okta
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
okta
Terraform Provider.