1. Packages
  2. Juniper Mist Provider
  3. API Docs
  4. org
  5. getSsoRoles
Juniper Mist v0.2.4 published on Saturday, Mar 1, 2025 by Pulumi

junipermist.org.getSsoRoles

Explore with Pulumi AI

junipermist logo
Juniper Mist v0.2.4 published on Saturday, Mar 1, 2025 by Pulumi

    This resource provides the list of SSO Roles.

    SSO roles refer to the different functions assigned to users within a Single Sign-On (SSO) system.
    These roles determine the tasks and actions that users can perform within the SSO system. There are typically predefined roles and custom roles in an SSO system.
    Roles in SSO provide a well-defined separation of responsibility and visibility, allowing for granular-level access control on SSO objects.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as junipermist from "@pulumi/junipermist";
    
    const ssoRoles = junipermist.org.getSsoRoles({
        orgId: "15fca2ac-b1a6-47cc-9953-cc6906281550",
    });
    
    import pulumi
    import pulumi_junipermist as junipermist
    
    sso_roles = junipermist.org.get_sso_roles(org_id="15fca2ac-b1a6-47cc-9953-cc6906281550")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-junipermist/sdk/go/junipermist/org"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := org.GetSsoRoles(ctx, &org.GetSsoRolesArgs{
    			OrgId: "15fca2ac-b1a6-47cc-9953-cc6906281550",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using JuniperMist = Pulumi.JuniperMist;
    
    return await Deployment.RunAsync(() => 
    {
        var ssoRoles = JuniperMist.Org.GetSsoRoles.Invoke(new()
        {
            OrgId = "15fca2ac-b1a6-47cc-9953-cc6906281550",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.junipermist.org.OrgFunctions;
    import com.pulumi.junipermist.org.inputs.GetSsoRolesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var ssoRoles = OrgFunctions.getSsoRoles(GetSsoRolesArgs.builder()
                .orgId("15fca2ac-b1a6-47cc-9953-cc6906281550")
                .build());
    
        }
    }
    
    variables:
      ssoRoles:
        fn::invoke:
          function: junipermist:org:getSsoRoles
          arguments:
            orgId: 15fca2ac-b1a6-47cc-9953-cc6906281550
    

    Using getSsoRoles

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getSsoRoles(args: GetSsoRolesArgs, opts?: InvokeOptions): Promise<GetSsoRolesResult>
    function getSsoRolesOutput(args: GetSsoRolesOutputArgs, opts?: InvokeOptions): Output<GetSsoRolesResult>
    def get_sso_roles(org_id: Optional[str] = None,
                      opts: Optional[InvokeOptions] = None) -> GetSsoRolesResult
    def get_sso_roles_output(org_id: Optional[pulumi.Input[str]] = None,
                      opts: Optional[InvokeOptions] = None) -> Output[GetSsoRolesResult]
    func GetSsoRoles(ctx *Context, args *GetSsoRolesArgs, opts ...InvokeOption) (*GetSsoRolesResult, error)
    func GetSsoRolesOutput(ctx *Context, args *GetSsoRolesOutputArgs, opts ...InvokeOption) GetSsoRolesResultOutput

    > Note: This function is named GetSsoRoles in the Go SDK.

    public static class GetSsoRoles 
    {
        public static Task<GetSsoRolesResult> InvokeAsync(GetSsoRolesArgs args, InvokeOptions? opts = null)
        public static Output<GetSsoRolesResult> Invoke(GetSsoRolesInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetSsoRolesResult> getSsoRoles(GetSsoRolesArgs args, InvokeOptions options)
    public static Output<GetSsoRolesResult> getSsoRoles(GetSsoRolesArgs args, InvokeOptions options)
    
    fn::invoke:
      function: junipermist:org/getSsoRoles:getSsoRoles
      arguments:
        # arguments dictionary

    The following arguments are supported:

    OrgId string
    OrgId string
    orgId String
    orgId string
    org_id str
    orgId String

    getSsoRoles Result

    The following output properties are available:

    Id string
    The provider-assigned unique ID for this managed resource.
    OrgId string
    OrgSsoRoles List<Pulumi.JuniperMist.Org.Outputs.GetSsoRolesOrgSsoRole>
    Id string
    The provider-assigned unique ID for this managed resource.
    OrgId string
    OrgSsoRoles []GetSsoRolesOrgSsoRole
    id String
    The provider-assigned unique ID for this managed resource.
    orgId String
    orgSsoRoles List<GetSsoRolesOrgSsoRole>
    id string
    The provider-assigned unique ID for this managed resource.
    orgId string
    orgSsoRoles GetSsoRolesOrgSsoRole[]
    id str
    The provider-assigned unique ID for this managed resource.
    org_id str
    org_sso_roles Sequence[GetSsoRolesOrgSsoRole]
    id String
    The provider-assigned unique ID for this managed resource.
    orgId String
    orgSsoRoles List<Property Map>

    Supporting Types

    GetSsoRolesOrgSsoRole

    CreatedTime double
    When the object has been created, in epoch
    Id string
    Unique ID of the object instance in the Mist Organnization
    ModifiedTime double
    When the object has been modified for the last time, in epoch
    Name string
    OrgId string
    Privileges List<Pulumi.JuniperMist.Org.Inputs.GetSsoRolesOrgSsoRolePrivilege>
    CreatedTime float64
    When the object has been created, in epoch
    Id string
    Unique ID of the object instance in the Mist Organnization
    ModifiedTime float64
    When the object has been modified for the last time, in epoch
    Name string
    OrgId string
    Privileges []GetSsoRolesOrgSsoRolePrivilege
    createdTime Double
    When the object has been created, in epoch
    id String
    Unique ID of the object instance in the Mist Organnization
    modifiedTime Double
    When the object has been modified for the last time, in epoch
    name String
    orgId String
    privileges List<GetSsoRolesOrgSsoRolePrivilege>
    createdTime number
    When the object has been created, in epoch
    id string
    Unique ID of the object instance in the Mist Organnization
    modifiedTime number
    When the object has been modified for the last time, in epoch
    name string
    orgId string
    privileges GetSsoRolesOrgSsoRolePrivilege[]
    created_time float
    When the object has been created, in epoch
    id str
    Unique ID of the object instance in the Mist Organnization
    modified_time float
    When the object has been modified for the last time, in epoch
    name str
    org_id str
    privileges Sequence[GetSsoRolesOrgSsoRolePrivilege]
    createdTime Number
    When the object has been created, in epoch
    id String
    Unique ID of the object instance in the Mist Organnization
    modifiedTime Number
    When the object has been modified for the last time, in epoch
    name String
    orgId String
    privileges List<Property Map>

    GetSsoRolesOrgSsoRolePrivilege

    Role string
    access permissions. enum: admin, helpdesk, installer, read, write
    Scope string
    enum: org, site, sitegroup
    SiteId string
    If scope==site
    SitegroupId string
    If scope==sitegroup
    Views List<string>

    Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users. Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users.
    You can define custom roles by adding the views attribute along with role when assigning privileges.
    Below are the list of supported UI views. Note that this is UI only feature.

    | UI View | Required Role | Description | | --- | --- | --- | | reporting | read | full access to all analytics tools | | marketing | read | can view analytics and location maps | | super_observer | read | can view all the organization except the subscription page | | location | write | can view and manage location maps, can view analytics | | security | write | can view and manage site labels, policies and security | | switch_admin | helpdesk | can view and manage Switch ports, can view wired clients | | mxedge_admin | admin | can view and manage Mist edges and Mist tunnels | | lobby_admin | admin | full access to Org and Site Pre-shared keys |

    Role string
    access permissions. enum: admin, helpdesk, installer, read, write
    Scope string
    enum: org, site, sitegroup
    SiteId string
    If scope==site
    SitegroupId string
    If scope==sitegroup
    Views []string

    Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users. Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users.
    You can define custom roles by adding the views attribute along with role when assigning privileges.
    Below are the list of supported UI views. Note that this is UI only feature.

    | UI View | Required Role | Description | | --- | --- | --- | | reporting | read | full access to all analytics tools | | marketing | read | can view analytics and location maps | | super_observer | read | can view all the organization except the subscription page | | location | write | can view and manage location maps, can view analytics | | security | write | can view and manage site labels, policies and security | | switch_admin | helpdesk | can view and manage Switch ports, can view wired clients | | mxedge_admin | admin | can view and manage Mist edges and Mist tunnels | | lobby_admin | admin | full access to Org and Site Pre-shared keys |

    role String
    access permissions. enum: admin, helpdesk, installer, read, write
    scope String
    enum: org, site, sitegroup
    siteId String
    If scope==site
    sitegroupId String
    If scope==sitegroup
    views List<String>

    Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users. Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users.
    You can define custom roles by adding the views attribute along with role when assigning privileges.
    Below are the list of supported UI views. Note that this is UI only feature.

    | UI View | Required Role | Description | | --- | --- | --- | | reporting | read | full access to all analytics tools | | marketing | read | can view analytics and location maps | | super_observer | read | can view all the organization except the subscription page | | location | write | can view and manage location maps, can view analytics | | security | write | can view and manage site labels, policies and security | | switch_admin | helpdesk | can view and manage Switch ports, can view wired clients | | mxedge_admin | admin | can view and manage Mist edges and Mist tunnels | | lobby_admin | admin | full access to Org and Site Pre-shared keys |

    role string
    access permissions. enum: admin, helpdesk, installer, read, write
    scope string
    enum: org, site, sitegroup
    siteId string
    If scope==site
    sitegroupId string
    If scope==sitegroup
    views string[]

    Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users. Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users.
    You can define custom roles by adding the views attribute along with role when assigning privileges.
    Below are the list of supported UI views. Note that this is UI only feature.

    | UI View | Required Role | Description | | --- | --- | --- | | reporting | read | full access to all analytics tools | | marketing | read | can view analytics and location maps | | super_observer | read | can view all the organization except the subscription page | | location | write | can view and manage location maps, can view analytics | | security | write | can view and manage site labels, policies and security | | switch_admin | helpdesk | can view and manage Switch ports, can view wired clients | | mxedge_admin | admin | can view and manage Mist edges and Mist tunnels | | lobby_admin | admin | full access to Org and Site Pre-shared keys |

    role str
    access permissions. enum: admin, helpdesk, installer, read, write
    scope str
    enum: org, site, sitegroup
    site_id str
    If scope==site
    sitegroup_id str
    If scope==sitegroup
    views Sequence[str]

    Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users. Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users.
    You can define custom roles by adding the views attribute along with role when assigning privileges.
    Below are the list of supported UI views. Note that this is UI only feature.

    | UI View | Required Role | Description | | --- | --- | --- | | reporting | read | full access to all analytics tools | | marketing | read | can view analytics and location maps | | super_observer | read | can view all the organization except the subscription page | | location | write | can view and manage location maps, can view analytics | | security | write | can view and manage site labels, policies and security | | switch_admin | helpdesk | can view and manage Switch ports, can view wired clients | | mxedge_admin | admin | can view and manage Mist edges and Mist tunnels | | lobby_admin | admin | full access to Org and Site Pre-shared keys |

    role String
    access permissions. enum: admin, helpdesk, installer, read, write
    scope String
    enum: org, site, sitegroup
    siteId String
    If scope==site
    sitegroupId String
    If scope==sitegroup
    views List<String>

    Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users. Custom roles restrict Org users to specific UI views. This is useful for limiting UI access of Org users.
    You can define custom roles by adding the views attribute along with role when assigning privileges.
    Below are the list of supported UI views. Note that this is UI only feature.

    | UI View | Required Role | Description | | --- | --- | --- | | reporting | read | full access to all analytics tools | | marketing | read | can view analytics and location maps | | super_observer | read | can view all the organization except the subscription page | | location | write | can view and manage location maps, can view analytics | | security | write | can view and manage site labels, policies and security | | switch_admin | helpdesk | can view and manage Switch ports, can view wired clients | | mxedge_admin | admin | can view and manage Mist edges and Mist tunnels | | lobby_admin | admin | full access to Org and Site Pre-shared keys |

    Package Details

    Repository
    junipermist pulumi/pulumi-junipermist
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the mist Terraform Provider.
    junipermist logo
    Juniper Mist v0.2.4 published on Saturday, Mar 1, 2025 by Pulumi