konnect.PortalAuth
Explore with Pulumi AI
PortalAuth Resource
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as konnect from "@pulumi/konnect";
const myPortalauth = new konnect.PortalAuth("myPortalauth", {
basicAuthEnabled: true,
idpMappingEnabled: true,
konnectMappingEnabled: false,
oidcAuthEnabled: false,
oidcClaimMappings: {
email: "email",
groups: "custom-group-claim",
name: "name",
},
oidcClientId: "...my_oidc_client_id...",
oidcClientSecret: "...my_oidc_client_secret...",
oidcIssuer: "...my_oidc_issuer...",
oidcScopes: ["..."],
oidcTeamMappingEnabled: true,
portalId: "7767e05c-f054-40cb-8b51-1f99bda85654",
samlAuthEnabled: false,
});
import pulumi
import pulumi_konnect as konnect
my_portalauth = konnect.PortalAuth("myPortalauth",
basic_auth_enabled=True,
idp_mapping_enabled=True,
konnect_mapping_enabled=False,
oidc_auth_enabled=False,
oidc_claim_mappings={
"email": "email",
"groups": "custom-group-claim",
"name": "name",
},
oidc_client_id="...my_oidc_client_id...",
oidc_client_secret="...my_oidc_client_secret...",
oidc_issuer="...my_oidc_issuer...",
oidc_scopes=["..."],
oidc_team_mapping_enabled=True,
portal_id="7767e05c-f054-40cb-8b51-1f99bda85654",
saml_auth_enabled=False)
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/konnect/v2/konnect"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := konnect.NewPortalAuth(ctx, "myPortalauth", &konnect.PortalAuthArgs{
BasicAuthEnabled: pulumi.Bool(true),
IdpMappingEnabled: pulumi.Bool(true),
KonnectMappingEnabled: pulumi.Bool(false),
OidcAuthEnabled: pulumi.Bool(false),
OidcClaimMappings: &konnect.PortalAuthOidcClaimMappingsArgs{
Email: pulumi.String("email"),
Groups: pulumi.String("custom-group-claim"),
Name: pulumi.String("name"),
},
OidcClientId: pulumi.String("...my_oidc_client_id..."),
OidcClientSecret: pulumi.String("...my_oidc_client_secret..."),
OidcIssuer: pulumi.String("...my_oidc_issuer..."),
OidcScopes: pulumi.StringArray{
pulumi.String("..."),
},
OidcTeamMappingEnabled: pulumi.Bool(true),
PortalId: pulumi.String("7767e05c-f054-40cb-8b51-1f99bda85654"),
SamlAuthEnabled: pulumi.Bool(false),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Konnect = Pulumi.Konnect;
return await Deployment.RunAsync(() =>
{
var myPortalauth = new Konnect.PortalAuth("myPortalauth", new()
{
BasicAuthEnabled = true,
IdpMappingEnabled = true,
KonnectMappingEnabled = false,
OidcAuthEnabled = false,
OidcClaimMappings = new Konnect.Inputs.PortalAuthOidcClaimMappingsArgs
{
Email = "email",
Groups = "custom-group-claim",
Name = "name",
},
OidcClientId = "...my_oidc_client_id...",
OidcClientSecret = "...my_oidc_client_secret...",
OidcIssuer = "...my_oidc_issuer...",
OidcScopes = new[]
{
"...",
},
OidcTeamMappingEnabled = true,
PortalId = "7767e05c-f054-40cb-8b51-1f99bda85654",
SamlAuthEnabled = false,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.konnect.PortalAuth;
import com.pulumi.konnect.PortalAuthArgs;
import com.pulumi.konnect.inputs.PortalAuthOidcClaimMappingsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myPortalauth = new PortalAuth("myPortalauth", PortalAuthArgs.builder()
.basicAuthEnabled(true)
.idpMappingEnabled(true)
.konnectMappingEnabled(false)
.oidcAuthEnabled(false)
.oidcClaimMappings(PortalAuthOidcClaimMappingsArgs.builder()
.email("email")
.groups("custom-group-claim")
.name("name")
.build())
.oidcClientId("...my_oidc_client_id...")
.oidcClientSecret("...my_oidc_client_secret...")
.oidcIssuer("...my_oidc_issuer...")
.oidcScopes("...")
.oidcTeamMappingEnabled(true)
.portalId("7767e05c-f054-40cb-8b51-1f99bda85654")
.samlAuthEnabled(false)
.build());
}
}
resources:
myPortalauth:
type: konnect:PortalAuth
properties:
basicAuthEnabled: true
idpMappingEnabled: true
konnectMappingEnabled: false
oidcAuthEnabled: false
oidcClaimMappings:
email: email
groups: custom-group-claim
name: name
oidcClientId: '...my_oidc_client_id...'
oidcClientSecret: '...my_oidc_client_secret...'
oidcIssuer: '...my_oidc_issuer...'
oidcScopes:
- '...'
oidcTeamMappingEnabled: true
portalId: 7767e05c-f054-40cb-8b51-1f99bda85654
samlAuthEnabled: false
Create PortalAuth Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new PortalAuth(name: string, args: PortalAuthArgs, opts?: CustomResourceOptions);
@overload
def PortalAuth(resource_name: str,
args: PortalAuthArgs,
opts: Optional[ResourceOptions] = None)
@overload
def PortalAuth(resource_name: str,
opts: Optional[ResourceOptions] = None,
portal_id: Optional[str] = None,
basic_auth_enabled: Optional[bool] = None,
idp_mapping_enabled: Optional[bool] = None,
konnect_mapping_enabled: Optional[bool] = None,
oidc_auth_enabled: Optional[bool] = None,
oidc_claim_mappings: Optional[PortalAuthOidcClaimMappingsArgs] = None,
oidc_client_id: Optional[str] = None,
oidc_client_secret: Optional[str] = None,
oidc_issuer: Optional[str] = None,
oidc_scopes: Optional[Sequence[str]] = None,
oidc_team_mapping_enabled: Optional[bool] = None,
saml_auth_enabled: Optional[bool] = None)
func NewPortalAuth(ctx *Context, name string, args PortalAuthArgs, opts ...ResourceOption) (*PortalAuth, error)
public PortalAuth(string name, PortalAuthArgs args, CustomResourceOptions? opts = null)
public PortalAuth(String name, PortalAuthArgs args)
public PortalAuth(String name, PortalAuthArgs args, CustomResourceOptions options)
type: konnect:PortalAuth
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args PortalAuthArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args PortalAuthArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args PortalAuthArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args PortalAuthArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args PortalAuthArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var portalAuthResource = new Konnect.PortalAuth("portalAuthResource", new()
{
PortalId = "string",
BasicAuthEnabled = false,
IdpMappingEnabled = false,
KonnectMappingEnabled = false,
OidcAuthEnabled = false,
OidcClaimMappings = new Konnect.Inputs.PortalAuthOidcClaimMappingsArgs
{
Email = "string",
Groups = "string",
Name = "string",
},
OidcClientId = "string",
OidcClientSecret = "string",
OidcIssuer = "string",
OidcScopes = new[]
{
"string",
},
OidcTeamMappingEnabled = false,
SamlAuthEnabled = false,
});
example, err := konnect.NewPortalAuth(ctx, "portalAuthResource", &konnect.PortalAuthArgs{
PortalId: pulumi.String("string"),
BasicAuthEnabled: pulumi.Bool(false),
IdpMappingEnabled: pulumi.Bool(false),
KonnectMappingEnabled: pulumi.Bool(false),
OidcAuthEnabled: pulumi.Bool(false),
OidcClaimMappings: &.PortalAuthOidcClaimMappingsArgs{
Email: pulumi.String("string"),
Groups: pulumi.String("string"),
Name: pulumi.String("string"),
},
OidcClientId: pulumi.String("string"),
OidcClientSecret: pulumi.String("string"),
OidcIssuer: pulumi.String("string"),
OidcScopes: pulumi.StringArray{
pulumi.String("string"),
},
OidcTeamMappingEnabled: pulumi.Bool(false),
SamlAuthEnabled: pulumi.Bool(false),
})
var portalAuthResource = new PortalAuth("portalAuthResource", PortalAuthArgs.builder()
.portalId("string")
.basicAuthEnabled(false)
.idpMappingEnabled(false)
.konnectMappingEnabled(false)
.oidcAuthEnabled(false)
.oidcClaimMappings(PortalAuthOidcClaimMappingsArgs.builder()
.email("string")
.groups("string")
.name("string")
.build())
.oidcClientId("string")
.oidcClientSecret("string")
.oidcIssuer("string")
.oidcScopes("string")
.oidcTeamMappingEnabled(false)
.samlAuthEnabled(false)
.build());
portal_auth_resource = konnect.PortalAuth("portalAuthResource",
portal_id="string",
basic_auth_enabled=False,
idp_mapping_enabled=False,
konnect_mapping_enabled=False,
oidc_auth_enabled=False,
oidc_claim_mappings={
"email": "string",
"groups": "string",
"name": "string",
},
oidc_client_id="string",
oidc_client_secret="string",
oidc_issuer="string",
oidc_scopes=["string"],
oidc_team_mapping_enabled=False,
saml_auth_enabled=False)
const portalAuthResource = new konnect.PortalAuth("portalAuthResource", {
portalId: "string",
basicAuthEnabled: false,
idpMappingEnabled: false,
konnectMappingEnabled: false,
oidcAuthEnabled: false,
oidcClaimMappings: {
email: "string",
groups: "string",
name: "string",
},
oidcClientId: "string",
oidcClientSecret: "string",
oidcIssuer: "string",
oidcScopes: ["string"],
oidcTeamMappingEnabled: false,
samlAuthEnabled: false,
});
type: konnect:PortalAuth
properties:
basicAuthEnabled: false
idpMappingEnabled: false
konnectMappingEnabled: false
oidcAuthEnabled: false
oidcClaimMappings:
email: string
groups: string
name: string
oidcClientId: string
oidcClientSecret: string
oidcIssuer: string
oidcScopes:
- string
oidcTeamMappingEnabled: false
portalId: string
samlAuthEnabled: false
PortalAuth Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The PortalAuth resource accepts the following input properties:
- Portal
Id string - ID of the portal.
- Basic
Auth boolEnabled - The organization has basic auth enabled.
- Idp
Mapping boolEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- Konnect
Mapping boolEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- Oidc
Auth boolEnabled - The organization has OIDC disabled.
- Oidc
Claim PortalMappings Auth Oidc Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- Oidc
Client stringId - Oidc
Client stringSecret - Oidc
Issuer string - Oidc
Scopes List<string> - Oidc
Team boolMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- Saml
Auth boolEnabled - The portal has SAML enabled or disabled.
- Portal
Id string - ID of the portal.
- Basic
Auth boolEnabled - The organization has basic auth enabled.
- Idp
Mapping boolEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- Konnect
Mapping boolEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- Oidc
Auth boolEnabled - The organization has OIDC disabled.
- Oidc
Claim PortalMappings Auth Oidc Claim Mappings Args - Mappings from a portal developer atribute to an Identity Provider claim.
- Oidc
Client stringId - Oidc
Client stringSecret - Oidc
Issuer string - Oidc
Scopes []string - Oidc
Team boolMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- Saml
Auth boolEnabled - The portal has SAML enabled or disabled.
- portal
Id String - ID of the portal.
- basic
Auth BooleanEnabled - The organization has basic auth enabled.
- idp
Mapping BooleanEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect
Mapping BooleanEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc
Auth BooleanEnabled - The organization has OIDC disabled.
- oidc
Claim PortalMappings Auth Oidc Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc
Client StringId - oidc
Client StringSecret - oidc
Issuer String - oidc
Scopes List<String> - oidc
Team BooleanMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- saml
Auth BooleanEnabled - The portal has SAML enabled or disabled.
- portal
Id string - ID of the portal.
- basic
Auth booleanEnabled - The organization has basic auth enabled.
- idp
Mapping booleanEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect
Mapping booleanEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc
Auth booleanEnabled - The organization has OIDC disabled.
- oidc
Claim PortalMappings Auth Oidc Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc
Client stringId - oidc
Client stringSecret - oidc
Issuer string - oidc
Scopes string[] - oidc
Team booleanMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- saml
Auth booleanEnabled - The portal has SAML enabled or disabled.
- portal_
id str - ID of the portal.
- basic_
auth_ boolenabled - The organization has basic auth enabled.
- idp_
mapping_ boolenabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect_
mapping_ boolenabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc_
auth_ boolenabled - The organization has OIDC disabled.
- oidc_
claim_ Portalmappings Auth Oidc Claim Mappings Args - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc_
client_ strid - oidc_
client_ strsecret - oidc_
issuer str - oidc_
scopes Sequence[str] - oidc_
team_ boolmapping_ enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- saml_
auth_ boolenabled - The portal has SAML enabled or disabled.
- portal
Id String - ID of the portal.
- basic
Auth BooleanEnabled - The organization has basic auth enabled.
- idp
Mapping BooleanEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect
Mapping BooleanEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc
Auth BooleanEnabled - The organization has OIDC disabled.
- oidc
Claim Property MapMappings - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc
Client StringId - oidc
Client StringSecret - oidc
Issuer String - oidc
Scopes List<String> - oidc
Team BooleanMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- saml
Auth BooleanEnabled - The portal has SAML enabled or disabled.
Outputs
All input properties are implicitly available as output properties. Additionally, the PortalAuth resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Oidc
Config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- Id string
- The provider-assigned unique ID for this managed resource.
- Oidc
Config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- id String
- The provider-assigned unique ID for this managed resource.
- oidc
Config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- id string
- The provider-assigned unique ID for this managed resource.
- oidc
Config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- id str
- The provider-assigned unique ID for this managed resource.
- oidc_
config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- id String
- The provider-assigned unique ID for this managed resource.
- oidc
Config Property Map - Configuration properties for an OpenID Connect Identity Provider.
Look up Existing PortalAuth Resource
Get an existing PortalAuth resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: PortalAuthState, opts?: CustomResourceOptions): PortalAuth
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
basic_auth_enabled: Optional[bool] = None,
idp_mapping_enabled: Optional[bool] = None,
konnect_mapping_enabled: Optional[bool] = None,
oidc_auth_enabled: Optional[bool] = None,
oidc_claim_mappings: Optional[PortalAuthOidcClaimMappingsArgs] = None,
oidc_client_id: Optional[str] = None,
oidc_client_secret: Optional[str] = None,
oidc_config: Optional[PortalAuthOidcConfigArgs] = None,
oidc_issuer: Optional[str] = None,
oidc_scopes: Optional[Sequence[str]] = None,
oidc_team_mapping_enabled: Optional[bool] = None,
portal_id: Optional[str] = None,
saml_auth_enabled: Optional[bool] = None) -> PortalAuth
func GetPortalAuth(ctx *Context, name string, id IDInput, state *PortalAuthState, opts ...ResourceOption) (*PortalAuth, error)
public static PortalAuth Get(string name, Input<string> id, PortalAuthState? state, CustomResourceOptions? opts = null)
public static PortalAuth get(String name, Output<String> id, PortalAuthState state, CustomResourceOptions options)
resources: _: type: konnect:PortalAuth get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Basic
Auth boolEnabled - The organization has basic auth enabled.
- Idp
Mapping boolEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- Konnect
Mapping boolEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- Oidc
Auth boolEnabled - The organization has OIDC disabled.
- Oidc
Claim PortalMappings Auth Oidc Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- Oidc
Client stringId - Oidc
Client stringSecret - Oidc
Config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- Oidc
Issuer string - Oidc
Scopes List<string> - Oidc
Team boolMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- Portal
Id string - ID of the portal.
- Saml
Auth boolEnabled - The portal has SAML enabled or disabled.
- Basic
Auth boolEnabled - The organization has basic auth enabled.
- Idp
Mapping boolEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- Konnect
Mapping boolEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- Oidc
Auth boolEnabled - The organization has OIDC disabled.
- Oidc
Claim PortalMappings Auth Oidc Claim Mappings Args - Mappings from a portal developer atribute to an Identity Provider claim.
- Oidc
Client stringId - Oidc
Client stringSecret - Oidc
Config PortalAuth Oidc Config Args - Configuration properties for an OpenID Connect Identity Provider.
- Oidc
Issuer string - Oidc
Scopes []string - Oidc
Team boolMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- Portal
Id string - ID of the portal.
- Saml
Auth boolEnabled - The portal has SAML enabled or disabled.
- basic
Auth BooleanEnabled - The organization has basic auth enabled.
- idp
Mapping BooleanEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect
Mapping BooleanEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc
Auth BooleanEnabled - The organization has OIDC disabled.
- oidc
Claim PortalMappings Auth Oidc Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc
Client StringId - oidc
Client StringSecret - oidc
Config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- oidc
Issuer String - oidc
Scopes List<String> - oidc
Team BooleanMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- portal
Id String - ID of the portal.
- saml
Auth BooleanEnabled - The portal has SAML enabled or disabled.
- basic
Auth booleanEnabled - The organization has basic auth enabled.
- idp
Mapping booleanEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect
Mapping booleanEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc
Auth booleanEnabled - The organization has OIDC disabled.
- oidc
Claim PortalMappings Auth Oidc Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc
Client stringId - oidc
Client stringSecret - oidc
Config PortalAuth Oidc Config - Configuration properties for an OpenID Connect Identity Provider.
- oidc
Issuer string - oidc
Scopes string[] - oidc
Team booleanMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- portal
Id string - ID of the portal.
- saml
Auth booleanEnabled - The portal has SAML enabled or disabled.
- basic_
auth_ boolenabled - The organization has basic auth enabled.
- idp_
mapping_ boolenabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect_
mapping_ boolenabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc_
auth_ boolenabled - The organization has OIDC disabled.
- oidc_
claim_ Portalmappings Auth Oidc Claim Mappings Args - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc_
client_ strid - oidc_
client_ strsecret - oidc_
config PortalAuth Oidc Config Args - Configuration properties for an OpenID Connect Identity Provider.
- oidc_
issuer str - oidc_
scopes Sequence[str] - oidc_
team_ boolmapping_ enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- portal_
id str - ID of the portal.
- saml_
auth_ boolenabled - The portal has SAML enabled or disabled.
- basic
Auth BooleanEnabled - The organization has basic auth enabled.
- idp
Mapping BooleanEnabled - Whether IdP groups determine the Konnect Portal teams a developer has. This will soon replace oidcteammapping_enabled.
- konnect
Mapping BooleanEnabled - Whether a Konnect Identity Admin assigns teams to a developer.
- oidc
Auth BooleanEnabled - The organization has OIDC disabled.
- oidc
Claim Property MapMappings - Mappings from a portal developer atribute to an Identity Provider claim.
- oidc
Client StringId - oidc
Client StringSecret - oidc
Config Property Map - Configuration properties for an OpenID Connect Identity Provider.
- oidc
Issuer String - oidc
Scopes List<String> - oidc
Team BooleanMapping Enabled - Whether IdP groups determine the Konnect Portal teams a developer has.
- portal
Id String - ID of the portal.
- saml
Auth BooleanEnabled - The portal has SAML enabled or disabled.
Supporting Types
PortalAuthOidcClaimMappings, PortalAuthOidcClaimMappingsArgs
PortalAuthOidcConfig, PortalAuthOidcConfigArgs
- Claim
Mappings PortalAuth Oidc Config Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- Client
Id string - Issuer string
- Scopes List<string>
- Claim
Mappings PortalAuth Oidc Config Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- Client
Id string - Issuer string
- Scopes []string
- claim
Mappings PortalAuth Oidc Config Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- client
Id String - issuer String
- scopes List<String>
- claim
Mappings PortalAuth Oidc Config Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- client
Id string - issuer string
- scopes string[]
- claim_
mappings PortalAuth Oidc Config Claim Mappings - Mappings from a portal developer atribute to an Identity Provider claim.
- client_
id str - issuer str
- scopes Sequence[str]
- claim
Mappings Property Map - Mappings from a portal developer atribute to an Identity Provider claim.
- client
Id String - issuer String
- scopes List<String>
PortalAuthOidcConfigClaimMappings, PortalAuthOidcConfigClaimMappingsArgs
Import
$ pulumi import konnect:index/portalAuth:PortalAuth my_konnect_portal_auth ""
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- konnect kong/terraform-provider-konnect
- License
- Notes
- This Pulumi package is based on the
konnect
Terraform Provider.