{"name":"akeyless","version":"1.11.6","description":"A Pulumi provider dynamically bridged from akeyless.","attribution":"This Pulumi package is based on the [`akeyless` Terraform Provider](https://github.com/akeyless-community/terraform-provider-akeyless).","repository":"https://github.com/akeyless-community/terraform-provider-akeyless","publisher":"akeyless-community","meta":{"moduleFormat":"(.*)(?:/[^/]*)"},"language":{"csharp":{"compatibility":"tfbridge20","liftSingleValueMethodReturns":true,"respectSchemaVersion":true},"go":{"generateExtraInputTypes":true,"importBasePath":"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless","liftSingleValueMethodReturns":true,"respectSchemaVersion":true,"rootPackageName":"akeyless"},"java":{"basePackage":"","buildFiles":"","gradleNexusPublishPluginVersion":"","gradleTest":""},"nodejs":{"compatibility":"tfbridge20","disableUnionOutputTypes":true,"liftSingleValueMethodReturns":true,"packageDescription":"A Pulumi provider dynamically bridged from akeyless.","readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/akeyless-community/terraform-provider-akeyless)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-akeyless` repo](https://github.com/akeyless-community/terraform-provider-akeyless/issues).","respectSchemaVersion":true},"python":{"compatibility":"tfbridge20","pyproject":{"enabled":true},"readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/akeyless-community/terraform-provider-akeyless)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-akeyless` repo](https://github.com/akeyless-community/terraform-provider-akeyless/issues).","respectSchemaVersion":true}},"config":{"variables":{"apiGatewayAddress":{"type":"string","description":"Origin URL of the API Gateway server. This is a URL with a scheme, a hostname and a port."},"apiKeyLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FapiKeyLogins:apiKeyLogins"},"description":"A configuration block, described below, that attempts to authenticate using API-Key."},"awsIamLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FawsIamLogins:awsIamLogins"},"description":"A configuration block, described below, that attempts to authenticate using AWS-IAM authentication credentials."},"azureAdLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FazureAdLogins:azureAdLogins"},"description":"A configuration block, described below, that attempts to authenticate using Azure Active Directory authentication."},"certLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FcertLogins:certLogins"},"description":"A configuration block, described below, that attempts to authenticate using Certificate authentication.  The Certificate and the Private key can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS_AUTH_CERT and AKEYLESS_AUTH_KEY."},"emailLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FemailLogins:emailLogins"},"description":"A configuration block, described below, that attempts to authenticate using email and password."},"gcpLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FgcpLogins:gcpLogins"},"description":"A configuration block, described below, that attempts to authenticate using GCP-IAM authentication credentials."},"jwtLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FjwtLogins:jwtLogins"},"description":"A configuration block, described below, that attempts to authenticate using JWT authentication.  The JWT can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS_AUTH_JWT."},"tokenLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FtokenLogins:tokenLogins"},"description":"A configuration block, described below, that attempts to authenticate using akeyless token. The token can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS_AUTH_TOKEN."},"uidLogins":{"type":"array","items":{"$ref":"#/types/akeyless:config%2FuidLogins:uidLogins"},"description":"A configuration block, described below, that attempts to authenticate using Universal Identity authentication."}}},"types":{"akeyless:config/apiKeyLogins:apiKeyLogins":{"properties":{"accessId":{"type":"string"},"accessKey":{"type":"string","secret":true}},"type":"object","required":["accessId","accessKey"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/awsIamLogins:awsIamLogins":{"properties":{"accessId":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/azureAdLogins:azureAdLogins":{"properties":{"accessId":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/certLogins:certLogins":{"properties":{"accessId":{"type":"string"},"certData":{"type":"string","secret":true},"certFileName":{"type":"string"},"keyData":{"type":"string","secret":true},"keyFileName":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/emailLogins:emailLogins":{"properties":{"adminEmail":{"type":"string"},"adminPassword":{"type":"string"}},"type":"object","required":["adminEmail","adminPassword"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/gcpLogins:gcpLogins":{"properties":{"accessId":{"type":"string"},"audience":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/jwtLogins:jwtLogins":{"properties":{"accessId":{"type":"string"},"jwt":{"type":"string","secret":true}},"type":"object","required":["accessId","jwt"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/tokenLogins:tokenLogins":{"properties":{"token":{"type":"string","secret":true}},"type":"object","required":["token"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:config/uidLogins:uidLogins":{"properties":{"accessId":{"type":"string"},"uidToken":{"type":"string","secret":true}},"type":"object","required":["uidToken"],"language":{"nodejs":{"requiredInputs":[]}}},"akeyless:index/AuthMethodApiKey:AuthMethodApiKey":{"type":"object"},"akeyless:index/AuthMethodAwsIam:AuthMethodAwsIam":{"properties":{"boundArns":{"type":"array","items":{"type":"string"},"description":"A list of full arns that the access is restricted to\n"},"boundAwsAccountIds":{"type":"array","items":{"type":"string"},"description":"A list of AWS account-IDs that the access is restricted to\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundRoleIds":{"type":"array","items":{"type":"string"},"description":"A list of full role ids that the access is restricted to\n"},"boundRoleNames":{"type":"array","items":{"type":"string"},"description":"A list of full role-name that the access is restricted to\n"},"boundUserIds":{"type":"array","items":{"type":"string"},"description":"A list of full user ids that the access is restricted to\n"},"boundUserNames":{"type":"array","items":{"type":"string"},"description":"A list of full user-name that the access is restricted to\n"},"stsUrl":{"type":"string","description":"STS URL (default: https://sts.amazonaws.com)\n"}},"type":"object","required":["boundAwsAccountIds"]},"akeyless:index/AuthMethodAzureAd:AuthMethodAzureAd":{"properties":{"boundGroupIds":{"type":"array","items":{"type":"string"},"description":"A list of group ids that the access is restricted to\n"},"boundProviders":{"type":"array","items":{"type":"string"},"description":"A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc)\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundResourceNames":{"type":"array","items":{"type":"string"},"description":"A list of resource names that the access is restricted to (e.g, a virtual machine name, scale set name, etc)\n"},"boundResourceTypes":{"type":"array","items":{"type":"string"},"description":"A list of resource types that the access is restricted to (e.g, virtualMachines, userAssignedIdentities, etc)\n"},"boundRgIds":{"type":"array","items":{"type":"string"},"description":"A list of resource groups that the access is restricted to\n"},"boundSpids":{"type":"array","items":{"type":"string"},"description":"A list of service principal IDs that the access is restricted to\n"},"boundSubIds":{"type":"array","items":{"type":"string"},"description":"A list of subscription ids that the access is restricted to\n"},"boundTenantId":{"type":"string","description":"The Azure tenant id that the access is restricted to\n"},"customAudience":{"type":"string","description":"The audience in the JWT\n"},"customIssuer":{"type":"string","description":"Issuer URL\n"},"jwksUri":{"type":"string","description":"The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server\n"}},"type":"object","required":["boundTenantId"]},"akeyless:index/AuthMethodGcp:AuthMethodGcp":{"properties":{"audience":{"type":"string","description":"The audience to verify in the JWT received by the client\n"},"gces":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodGcpGce:AuthMethodGcpGce"},"description":"IAM GCE Auth Method\n"},"iams":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodGcpIam:AuthMethodGcpIam"},"description":"IAM GCP Auth Method\n"},"serviceAccountCredsData":{"type":"string","description":"Service Account creds data, base64 encoded\n"}},"type":"object","required":["serviceAccountCredsData"]},"akeyless:index/AuthMethodGcpGce:AuthMethodGcpGce":{"properties":{"boundLabels":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of GCP labels formatted as \"key:value\" pairs that must be set on instances in order to authenticate\n"},"boundRegions":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of regions. GCE instances must belong to any of the provided regions in order to authenticate\n"},"boundZones":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of zones. GCE instances must belong to any of the provided zones in order to authenticate\n"}},"type":"object"},"akeyless:index/AuthMethodGcpIam:AuthMethodGcpIam":{"properties":{"boundServiceAccounts":{"type":"array","items":{"type":"string"},"description":"IAM only. A list of Service Accounts. Clients must belong to any of the provided service accounts in order to authenticate\n"}},"type":"object"},"akeyless:index/AuthMethodSaml:AuthMethodSaml":{"properties":{"idpMetadataUrl":{"type":"string","description":"IDP metadata url\n"},"idpMetadataXmlData":{"type":"string","description":"IDP metadata xml data\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example\n"}},"type":"object","required":["uniqueIdentifier"]},"akeyless:index/ProviderApiKeyLogin:ProviderApiKeyLogin":{"properties":{"accessId":{"type":"string"},"accessKey":{"type":"string","secret":true}},"type":"object","required":["accessId","accessKey"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderAwsIamLogin:ProviderAwsIamLogin":{"properties":{"accessId":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderAzureAdLogin:ProviderAzureAdLogin":{"properties":{"accessId":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderCertLogin:ProviderCertLogin":{"properties":{"accessId":{"type":"string"},"certData":{"type":"string","secret":true},"certFileName":{"type":"string"},"keyData":{"type":"string","secret":true},"keyFileName":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderEmailLogin:ProviderEmailLogin":{"properties":{"adminEmail":{"type":"string"},"adminPassword":{"type":"string"}},"type":"object","required":["adminEmail","adminPassword"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderGcpLogin:ProviderGcpLogin":{"properties":{"accessId":{"type":"string"},"audience":{"type":"string"}},"type":"object","required":["accessId"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderJwtLogin:ProviderJwtLogin":{"properties":{"accessId":{"type":"string"},"jwt":{"type":"string","secret":true}},"type":"object","required":["accessId","jwt"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderTokenLogin:ProviderTokenLogin":{"properties":{"token":{"type":"string","secret":true}},"type":"object","required":["token"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/ProviderUidLogin:ProviderUidLogin":{"properties":{"accessId":{"type":"string"},"uidToken":{"type":"string","secret":true}},"type":"object","required":["uidToken"],"language":{"nodejs":{"requiredOutputs":[]}}},"akeyless:index/RoleAssocAuthMethod:RoleAssocAuthMethod":{"properties":{"accessId":{"type":"string","description":"The access ID of the auth method\n"},"amName":{"type":"string","description":"The auth method to associate\n"},"assocId":{"type":"string","description":"The association ID\n"},"caseSensitive":{"type":"string","description":"Treat sub claims as case-sensitive\n"},"subClaims":{"type":"object","additionalProperties":{"type":"string"},"description":"key/val of sub claims, e.g group=admins,developers\n"}},"type":"object","required":["amName"],"language":{"nodejs":{"requiredOutputs":["accessId","amName","assocId"]}}},"akeyless:index/RoleRestrictedRule:RoleRestrictedRule":{"properties":{"capabilities":{"type":"array","items":{"type":"string"}},"path":{"type":"string"},"ruleType":{"type":"string"}},"type":"object","required":["capabilities","path","ruleType"]},"akeyless:index/RoleRule:RoleRule":{"properties":{"capabilities":{"type":"array","items":{"type":"string"},"description":"List of the approved/denied capabilities in the path options: [read, create, update, delete, list, deny] for sra-rule type: [allow*access, request*access, justify*access*only, approval*authority, upload*files,\u003cspan pulumi-lang-nodejs=\" downloadFiles]\" pulumi-lang-dotnet=\" DownloadFiles]\" pulumi-lang-go=\" downloadFiles]\" pulumi-lang-python=\" download_files]\" pulumi-lang-yaml=\" downloadFiles]\" pulumi-lang-java=\" downloadFiles]\"\u003e download_files]\u003c/span\u003e\n"},"path":{"type":"string","description":"The path the rule refers to\n"},"ruleType":{"type":"string","description":"item-rule, target-rule, role-rule, auth-method-rule, sra-rule\n"}},"type":"object","required":["capabilities","path"]},"akeyless:index/getAuthApiKeyLogin:getAuthApiKeyLogin":{"properties":{"accessId":{"type":"string"},"accessKey":{"type":"string","secret":true}},"type":"object","required":["accessId","accessKey"]},"akeyless:index/getAuthAwsIamLogin:getAuthAwsIamLogin":{"properties":{"accessId":{"type":"string"}},"type":"object","required":["accessId"]},"akeyless:index/getAuthAzureAdLogin:getAuthAzureAdLogin":{"properties":{"accessId":{"type":"string"}},"type":"object","required":["accessId"]},"akeyless:index/getAuthCertLogin:getAuthCertLogin":{"properties":{"accessId":{"type":"string"},"certData":{"type":"string","secret":true},"certFileName":{"type":"string"},"keyData":{"type":"string","secret":true},"keyFileName":{"type":"string"}},"type":"object","required":["accessId"]},"akeyless:index/getAuthEmailLogin:getAuthEmailLogin":{"properties":{"adminEmail":{"type":"string"},"adminPassword":{"type":"string"}},"type":"object","required":["adminEmail","adminPassword"]},"akeyless:index/getAuthGcpLogin:getAuthGcpLogin":{"properties":{"accessId":{"type":"string"},"audience":{"type":"string"}},"type":"object","required":["accessId"]},"akeyless:index/getAuthJwtLogin:getAuthJwtLogin":{"properties":{"accessId":{"type":"string"},"jwt":{"type":"string","secret":true}},"type":"object","required":["accessId","jwt"]},"akeyless:index/getAuthUidLogin:getAuthUidLogin":{"properties":{"accessId":{"type":"string"},"uidToken":{"type":"string","secret":true}},"type":"object","required":["uidToken"]},"akeyless:index/getItemsItem:getItemsItem":{"properties":{"displayId":{"type":"string"},"id":{"type":"number"},"isEnabled":{"type":"boolean"},"lastVersion":{"type":"number"},"name":{"type":"string"},"type":{"type":"string"}},"type":"object","required":["displayId","id","isEnabled","lastVersion","name","type"],"language":{"nodejs":{"requiredInputs":[]}}}},"provider":{"description":"The provider type for the akeyless package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n","properties":{"apiGatewayAddress":{"type":"string","description":"Origin URL of the API Gateway server. This is a URL with a scheme, a hostname and a port."}},"type":"object","inputProperties":{"apiGatewayAddress":{"type":"string","description":"Origin URL of the API Gateway server. This is a URL with a scheme, a hostname and a port."},"apiKeyLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderApiKeyLogin:ProviderApiKeyLogin"},"description":"A configuration block, described below, that attempts to authenticate using API-Key."},"awsIamLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderAwsIamLogin:ProviderAwsIamLogin"},"description":"A configuration block, described below, that attempts to authenticate using AWS-IAM authentication credentials."},"azureAdLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderAzureAdLogin:ProviderAzureAdLogin"},"description":"A configuration block, described below, that attempts to authenticate using Azure Active Directory authentication."},"certLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderCertLogin:ProviderCertLogin"},"description":"A configuration block, described below, that attempts to authenticate using Certificate authentication.  The Certificate and the Private key can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS_AUTH_CERT and AKEYLESS_AUTH_KEY."},"emailLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderEmailLogin:ProviderEmailLogin"},"description":"A configuration block, described below, that attempts to authenticate using email and password."},"gcpLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderGcpLogin:ProviderGcpLogin"},"description":"A configuration block, described below, that attempts to authenticate using GCP-IAM authentication credentials."},"jwtLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderJwtLogin:ProviderJwtLogin"},"description":"A configuration block, described below, that attempts to authenticate using JWT authentication.  The JWT can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS_AUTH_JWT."},"tokenLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderTokenLogin:ProviderTokenLogin"},"description":"A configuration block, described below, that attempts to authenticate using akeyless token. The token can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS_AUTH_TOKEN."},"uidLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FProviderUidLogin:ProviderUidLogin"},"description":"A configuration block, described below, that attempts to authenticate using Universal Identity authentication."}},"methods":{"terraformConfig":"pulumi:providers:akeyless/terraformConfig"}},"resources":{"akeyless:index/associateRoleAuthMethod:AssociateRoleAuthMethod":{"description":"Association between role and auth method\n","properties":{"amName":{"type":"string","description":"The auth method to associate\n"},"associateRoleAuthMethodId":{"type":"string","description":"The ID of this resource.\n"},"caseSensitive":{"type":"string","description":"Treat sub claims as case-sensitive\n"},"roleName":{"type":"string","description":"The role to associate\n"},"subClaims":{"type":"object","additionalProperties":{"type":"string"},"description":"key/val of sub claims, e.g group=admins,developers\n"}},"type":"object","required":["amName","associateRoleAuthMethodId","roleName"],"inputProperties":{"amName":{"type":"string","description":"The auth method to associate\n"},"associateRoleAuthMethodId":{"type":"string","description":"The ID of this resource.\n"},"caseSensitive":{"type":"string","description":"Treat sub claims as case-sensitive\n"},"roleName":{"type":"string","description":"The role to associate\n"},"subClaims":{"type":"object","additionalProperties":{"type":"string"},"description":"key/val of sub claims, e.g group=admins,developers\n"}},"requiredInputs":["amName","roleName"],"stateInputs":{"description":"Input properties used for looking up and filtering AssociateRoleAuthMethod resources.\n","properties":{"amName":{"type":"string","description":"The auth method to associate\n"},"associateRoleAuthMethodId":{"type":"string","description":"The ID of this resource.\n"},"caseSensitive":{"type":"string","description":"Treat sub claims as case-sensitive\n"},"roleName":{"type":"string","description":"The role to associate\n"},"subClaims":{"type":"object","additionalProperties":{"type":"string"},"description":"key/val of sub claims, e.g group=admins,developers\n"}},"type":"object"}},"akeyless:index/authMethod:AuthMethod":{"description":"Authentication Methods represent machine identities or human identities\n\n## Import\n\n```sh\n$ pulumi import akeyless:index/authMethod:AuthMethod example /full-auth-method-path/and-name-in-akeyless\n```\n\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"accessKey":{"type":"string","description":"Auth Method access key\n","secret":true},"apiKeys":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodApiKey:AuthMethodApiKey"},"description":"A configuration block, described below, using API-Key Auth Method\n"},"authMethodId":{"type":"string","description":"The ID of this resource.\n"},"awsIams":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodAwsIam:AuthMethodAwsIam"},"description":"A configuration block, described below, using AWS-IAM Auth Method\n"},"azureAds":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodAzureAd:AuthMethodAzureAd"},"description":"A configuration block, described below, using Azure AD Auth Method\n"},"boundIps":{"type":"string","description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"gcps":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodGcp:AuthMethodGcp"},"description":"A configuration block, described below, using Auth Method API-Key\n"},"path":{"type":"string","description":"The path where the Auth Method will be stored\n"},"samls":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodSaml:AuthMethodSaml"},"description":"A configuration block, described below, using SAML Auth Method\n"}},"type":"object","required":["accessId","accessKey","authMethodId","path"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"apiKeys":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodApiKey:AuthMethodApiKey"},"description":"A configuration block, described below, using API-Key Auth Method\n"},"authMethodId":{"type":"string","description":"The ID of this resource.\n"},"awsIams":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodAwsIam:AuthMethodAwsIam"},"description":"A configuration block, described below, using AWS-IAM Auth Method\n"},"azureAds":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodAzureAd:AuthMethodAzureAd"},"description":"A configuration block, described below, using Azure AD Auth Method\n"},"boundIps":{"type":"string","description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"gcps":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodGcp:AuthMethodGcp"},"description":"A configuration block, described below, using Auth Method API-Key\n"},"path":{"type":"string","description":"The path where the Auth Method will be stored\n"},"samls":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodSaml:AuthMethodSaml"},"description":"A configuration block, described below, using SAML Auth Method\n"}},"requiredInputs":["path"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethod resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"accessKey":{"type":"string","description":"Auth Method access key\n","secret":true},"apiKeys":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodApiKey:AuthMethodApiKey"},"description":"A configuration block, described below, using API-Key Auth Method\n"},"authMethodId":{"type":"string","description":"The ID of this resource.\n"},"awsIams":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodAwsIam:AuthMethodAwsIam"},"description":"A configuration block, described below, using AWS-IAM Auth Method\n"},"azureAds":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodAzureAd:AuthMethodAzureAd"},"description":"A configuration block, described below, using Azure AD Auth Method\n"},"boundIps":{"type":"string","description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"gcps":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodGcp:AuthMethodGcp"},"description":"A configuration block, described below, using Auth Method API-Key\n"},"path":{"type":"string","description":"The path where the Auth Method will be stored\n"},"samls":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FAuthMethodSaml:AuthMethodSaml"},"description":"A configuration block, described below, using SAML Auth Method\n"}},"type":"object"}},"akeyless:index/authMethodApiKey:AuthMethodApiKey":{"description":"API Key Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"accessKey":{"type":"string","description":"Auth Method access key\n","secret":true},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodApiKeyId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"}},"type":"object","required":["accessId","accessKey","authMethodApiKeyId","name"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodApiKeyId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodApiKey resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"accessKey":{"type":"string","description":"Auth Method access key\n","secret":true},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodApiKeyId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"}},"type":"object"}},"akeyless:index/authMethodAwsIam:AuthMethodAwsIam":{"description":"AWS IAM Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodAwsIamId":{"type":"string","description":"The ID of this resource.\n"},"boundArns":{"type":"array","items":{"type":"string"},"description":"A list of full arns that the access is restricted to\n"},"boundAwsAccountIds":{"type":"array","items":{"type":"string"},"description":"A list of AWS account-IDs that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundRoleIds":{"type":"array","items":{"type":"string"},"description":"A list of full role ids that the access is restricted to\n"},"boundRoleNames":{"type":"array","items":{"type":"string"},"description":"A list of full role-name that the access is restricted to\n"},"boundUserIds":{"type":"array","items":{"type":"string"},"description":"A list of full user ids that the access is restricted to\n"},"boundUserNames":{"type":"array","items":{"type":"string"},"description":"A list of full user-name that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"stsUrl":{"type":"string","description":"sts URL\n"}},"type":"object","required":["accessId","authMethodAwsIamId","boundAwsAccountIds","name"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodAwsIamId":{"type":"string","description":"The ID of this resource.\n"},"boundArns":{"type":"array","items":{"type":"string"},"description":"A list of full arns that the access is restricted to\n"},"boundAwsAccountIds":{"type":"array","items":{"type":"string"},"description":"A list of AWS account-IDs that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundRoleIds":{"type":"array","items":{"type":"string"},"description":"A list of full role ids that the access is restricted to\n"},"boundRoleNames":{"type":"array","items":{"type":"string"},"description":"A list of full role-name that the access is restricted to\n"},"boundUserIds":{"type":"array","items":{"type":"string"},"description":"A list of full user ids that the access is restricted to\n"},"boundUserNames":{"type":"array","items":{"type":"string"},"description":"A list of full user-name that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"stsUrl":{"type":"string","description":"sts URL\n"}},"requiredInputs":["boundAwsAccountIds"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodAwsIam resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodAwsIamId":{"type":"string","description":"The ID of this resource.\n"},"boundArns":{"type":"array","items":{"type":"string"},"description":"A list of full arns that the access is restricted to\n"},"boundAwsAccountIds":{"type":"array","items":{"type":"string"},"description":"A list of AWS account-IDs that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundRoleIds":{"type":"array","items":{"type":"string"},"description":"A list of full role ids that the access is restricted to\n"},"boundRoleNames":{"type":"array","items":{"type":"string"},"description":"A list of full role-name that the access is restricted to\n"},"boundUserIds":{"type":"array","items":{"type":"string"},"description":"A list of full user ids that the access is restricted to\n"},"boundUserNames":{"type":"array","items":{"type":"string"},"description":"A list of full user-name that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"stsUrl":{"type":"string","description":"sts URL\n"}},"type":"object"}},"akeyless:index/authMethodAzureAd:AuthMethodAzureAd":{"description":"Azure Active Directory Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience in the JWT\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodAzureAdId":{"type":"string","description":"The ID of this resource.\n"},"boundGroupIds":{"type":"array","items":{"type":"string"},"description":"A list of group ids that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundProviders":{"type":"array","items":{"type":"string"},"description":"A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc)\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundResourceNames":{"type":"array","items":{"type":"string"},"description":"A list of resource names that the access is restricted to (e.g, a virtual machine name, scale set name, etc).\n"},"boundResourceTypes":{"type":"array","items":{"type":"string"},"description":"A list of resource types that the access is restricted to (e.g, virtualMachines, userAssignedIdentities, etc)\n"},"boundRgIds":{"type":"array","items":{"type":"string"},"description":"A list of resource groups that the access is restricted to\n"},"boundSpids":{"type":"array","items":{"type":"string"},"description":"A list of service principal IDs that the access is restricted to\n"},"boundSubIds":{"type":"array","items":{"type":"string"},"description":"A list of subscription ids that the access is restricted to\n"},"boundTenantId":{"type":"string","description":"The Azure tenant id that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwksUri":{"type":"string","description":"The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server.\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"}},"type":"object","required":["accessId","authMethodAzureAdId","boundTenantId","name"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"audience":{"type":"string","description":"The audience in the JWT\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodAzureAdId":{"type":"string","description":"The ID of this resource.\n"},"boundGroupIds":{"type":"array","items":{"type":"string"},"description":"A list of group ids that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundProviders":{"type":"array","items":{"type":"string"},"description":"A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc)\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundResourceNames":{"type":"array","items":{"type":"string"},"description":"A list of resource names that the access is restricted to (e.g, a virtual machine name, scale set name, etc).\n"},"boundResourceTypes":{"type":"array","items":{"type":"string"},"description":"A list of resource types that the access is restricted to (e.g, virtualMachines, userAssignedIdentities, etc)\n"},"boundRgIds":{"type":"array","items":{"type":"string"},"description":"A list of resource groups that the access is restricted to\n"},"boundSpids":{"type":"array","items":{"type":"string"},"description":"A list of service principal IDs that the access is restricted to\n"},"boundSubIds":{"type":"array","items":{"type":"string"},"description":"A list of subscription ids that the access is restricted to\n"},"boundTenantId":{"type":"string","description":"The Azure tenant id that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwksUri":{"type":"string","description":"The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server.\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"}},"requiredInputs":["boundTenantId"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodAzureAd resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience in the JWT\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodAzureAdId":{"type":"string","description":"The ID of this resource.\n"},"boundGroupIds":{"type":"array","items":{"type":"string"},"description":"A list of group ids that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundProviders":{"type":"array","items":{"type":"string"},"description":"A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc)\n"},"boundResourceIds":{"type":"array","items":{"type":"string"},"description":"A list of full resource ids that the access is restricted to\n"},"boundResourceNames":{"type":"array","items":{"type":"string"},"description":"A list of resource names that the access is restricted to (e.g, a virtual machine name, scale set name, etc).\n"},"boundResourceTypes":{"type":"array","items":{"type":"string"},"description":"A list of resource types that the access is restricted to (e.g, virtualMachines, userAssignedIdentities, etc)\n"},"boundRgIds":{"type":"array","items":{"type":"string"},"description":"A list of resource groups that the access is restricted to\n"},"boundSpids":{"type":"array","items":{"type":"string"},"description":"A list of service principal IDs that the access is restricted to\n"},"boundSubIds":{"type":"array","items":{"type":"string"},"description":"A list of subscription ids that the access is restricted to\n"},"boundTenantId":{"type":"string","description":"The Azure tenant id that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwksUri":{"type":"string","description":"The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server.\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"}},"type":"object"}},"akeyless:index/authMethodCert:AuthMethodCert":{"description":"Cert Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodCertId":{"type":"string","description":"The ID of this resource.\n"},"boundCommonNames":{"type":"array","items":{"type":"string"},"description":"A list of names. At least one must exist in the Common Name. Supports globbing.\n"},"boundDnsSans":{"type":"array","items":{"type":"string"},"description":"A list of DNS names. At least one must exist in the SANs. Supports globbing.\n"},"boundEmailSans":{"type":"array","items":{"type":"string"},"description":"A list of Email Addresses. At least one must exist in the SANs. Supports globbing.\n"},"boundExtensions":{"type":"array","items":{"type":"string"},"description":"A list of extensions formatted as 'oid:value'. Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on 'value'.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list to allow client access\n"},"boundOrganizationalUnits":{"type":"array","items":{"type":"string"},"description":"A list of Organizational Units names. At least one must exist in the OU field.\n"},"boundUriSans":{"type":"array","items":{"type":"string"},"description":"A list of URIs. At least one must exist in the SANs. Supports globbing.\n"},"certificateData":{"type":"string","description":"The certificate data in base64, if no file was provided.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"gwBoundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list as a trusted Gateway entity\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"revokedCertIds":{"type":"array","items":{"type":"string"},"description":"A list of revoked cert ids\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OIDC, OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object","required":["accessId","authMethodCertId","name","uniqueIdentifier"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodCertId":{"type":"string","description":"The ID of this resource.\n"},"boundCommonNames":{"type":"array","items":{"type":"string"},"description":"A list of names. At least one must exist in the Common Name. Supports globbing.\n"},"boundDnsSans":{"type":"array","items":{"type":"string"},"description":"A list of DNS names. At least one must exist in the SANs. Supports globbing.\n"},"boundEmailSans":{"type":"array","items":{"type":"string"},"description":"A list of Email Addresses. At least one must exist in the SANs. Supports globbing.\n"},"boundExtensions":{"type":"array","items":{"type":"string"},"description":"A list of extensions formatted as 'oid:value'. Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on 'value'.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list to allow client access\n"},"boundOrganizationalUnits":{"type":"array","items":{"type":"string"},"description":"A list of Organizational Units names. At least one must exist in the OU field.\n"},"boundUriSans":{"type":"array","items":{"type":"string"},"description":"A list of URIs. At least one must exist in the SANs. Supports globbing.\n"},"certificateData":{"type":"string","description":"The certificate data in base64, if no file was provided.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"gwBoundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list as a trusted Gateway entity\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"revokedCertIds":{"type":"array","items":{"type":"string"},"description":"A list of revoked cert ids\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OIDC, OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"requiredInputs":["uniqueIdentifier"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodCert resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodCertId":{"type":"string","description":"The ID of this resource.\n"},"boundCommonNames":{"type":"array","items":{"type":"string"},"description":"A list of names. At least one must exist in the Common Name. Supports globbing.\n"},"boundDnsSans":{"type":"array","items":{"type":"string"},"description":"A list of DNS names. At least one must exist in the SANs. Supports globbing.\n"},"boundEmailSans":{"type":"array","items":{"type":"string"},"description":"A list of Email Addresses. At least one must exist in the SANs. Supports globbing.\n"},"boundExtensions":{"type":"array","items":{"type":"string"},"description":"A list of extensions formatted as 'oid:value'. Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on 'value'.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list to allow client access\n"},"boundOrganizationalUnits":{"type":"array","items":{"type":"string"},"description":"A list of Organizational Units names. At least one must exist in the OU field.\n"},"boundUriSans":{"type":"array","items":{"type":"string"},"description":"A list of URIs. At least one must exist in the SANs. Supports globbing.\n"},"certificateData":{"type":"string","description":"The certificate data in base64, if no file was provided.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"gwBoundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list as a trusted Gateway entity\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"revokedCertIds":{"type":"array","items":{"type":"string"},"description":"A list of revoked cert ids\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OIDC, OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object"}},"akeyless:index/authMethodGcp:AuthMethodGcp":{"description":"GCE Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience to verify in the JWT received by the client\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodGcpId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundLabels":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of GCP labels formatted as key:value pairs that must be set on instances in order to authenticate. For multiple values repeat this flag.\n"},"boundProjects":{"type":"array","items":{"type":"string"},"description":"A list of GCP project IDs. Clients must belong to any of the provided projects in order to authenticate. For multiple values repeat this flag.\n"},"boundRegions":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of regions. GCE instances must belong to any of the provided regions in order to authenticate. For multiple values repeat this flag.\n"},"boundServiceAccounts":{"type":"array","items":{"type":"string"},"description":"A list of Service Accounts. Clients must belong to any of the provided service accounts in order to authenticate. For multiple values repeat this flag.\n"},"boundZones":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of zones. GCE instances must belong to any of the provided zones in order to authenticate. For multiple values repeat this flag.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"serviceAccountCredsData":{"type":"string","description":"Service Account creds data, base64 encoded\n"},"type":{"type":"string","description":"The type of the GCP Auth Method (iam/gce)\n"}},"type":"object","required":["accessId","authMethodGcpId","name","type"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"audience":{"type":"string","description":"The audience to verify in the JWT received by the client\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodGcpId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundLabels":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of GCP labels formatted as key:value pairs that must be set on instances in order to authenticate. For multiple values repeat this flag.\n"},"boundProjects":{"type":"array","items":{"type":"string"},"description":"A list of GCP project IDs. Clients must belong to any of the provided projects in order to authenticate. For multiple values repeat this flag.\n"},"boundRegions":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of regions. GCE instances must belong to any of the provided regions in order to authenticate. For multiple values repeat this flag.\n"},"boundServiceAccounts":{"type":"array","items":{"type":"string"},"description":"A list of Service Accounts. Clients must belong to any of the provided service accounts in order to authenticate. For multiple values repeat this flag.\n"},"boundZones":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of zones. GCE instances must belong to any of the provided zones in order to authenticate. For multiple values repeat this flag.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"serviceAccountCredsData":{"type":"string","description":"Service Account creds data, base64 encoded\n"},"type":{"type":"string","description":"The type of the GCP Auth Method (iam/gce)\n"}},"requiredInputs":["type"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodGcp resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience to verify in the JWT received by the client\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodGcpId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundLabels":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of GCP labels formatted as key:value pairs that must be set on instances in order to authenticate. For multiple values repeat this flag.\n"},"boundProjects":{"type":"array","items":{"type":"string"},"description":"A list of GCP project IDs. Clients must belong to any of the provided projects in order to authenticate. For multiple values repeat this flag.\n"},"boundRegions":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of regions. GCE instances must belong to any of the provided regions in order to authenticate. For multiple values repeat this flag.\n"},"boundServiceAccounts":{"type":"array","items":{"type":"string"},"description":"A list of Service Accounts. Clients must belong to any of the provided service accounts in order to authenticate. For multiple values repeat this flag.\n"},"boundZones":{"type":"array","items":{"type":"string"},"description":"GCE only. A list of zones. GCE instances must belong to any of the provided zones in order to authenticate. For multiple values repeat this flag.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"serviceAccountCredsData":{"type":"string","description":"Service Account creds data, base64 encoded\n"},"type":{"type":"string","description":"The type of the GCP Auth Method (iam/gce)\n"}},"type":"object"}},"akeyless:index/authMethodK8s:AuthMethodK8s":{"description":"Kubernetes Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience in the Kubernetes JWT that the access is restricted to\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodK8sId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundNamespaces":{"type":"array","items":{"type":"string"},"description":"A list of namespaces that the access is restricted to\n"},"boundPodNames":{"type":"array","items":{"type":"string"},"description":"A list of pod names that the access is restricted to\n"},"boundSaNames":{"type":"array","items":{"type":"string"},"description":"A list of service account names that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"genKey":{"type":"string","description":"If this flag is set to true, there is no need to manually provide a public key for the Kubernetes Auth Method, and instead, a key pair, will be generated as part of the command and the private part of the key will be returned (the private key is required for the K8S Auth Config in the Akeyless Gateway)\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"privateKey":{"type":"string","description":"The generated private key\n"},"publicKey":{"type":"string","description":"The generated public key\n"}},"type":"object","required":["accessId","authMethodK8sId","name","privateKey","publicKey"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"audience":{"type":"string","description":"The audience in the Kubernetes JWT that the access is restricted to\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodK8sId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundNamespaces":{"type":"array","items":{"type":"string"},"description":"A list of namespaces that the access is restricted to\n"},"boundPodNames":{"type":"array","items":{"type":"string"},"description":"A list of pod names that the access is restricted to\n"},"boundSaNames":{"type":"array","items":{"type":"string"},"description":"A list of service account names that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"genKey":{"type":"string","description":"If this flag is set to true, there is no need to manually provide a public key for the Kubernetes Auth Method, and instead, a key pair, will be generated as part of the command and the private part of the key will be returned (the private key is required for the K8S Auth Config in the Akeyless Gateway)\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"publicKey":{"type":"string","description":"The generated public key\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodK8s resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience in the Kubernetes JWT that the access is restricted to\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodK8sId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"boundNamespaces":{"type":"array","items":{"type":"string"},"description":"A list of namespaces that the access is restricted to\n"},"boundPodNames":{"type":"array","items":{"type":"string"},"description":"A list of pod names that the access is restricted to\n"},"boundSaNames":{"type":"array","items":{"type":"string"},"description":"A list of service account names that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"genKey":{"type":"string","description":"If this flag is set to true, there is no need to manually provide a public key for the Kubernetes Auth Method, and instead, a key pair, will be generated as part of the command and the private part of the key will be returned (the private key is required for the K8S Auth Config in the Akeyless Gateway)\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"privateKey":{"type":"string","description":"The generated private key\n"},"publicKey":{"type":"string","description":"The generated public key\n"}},"type":"object"}},"akeyless:index/authMethodLdap:AuthMethodLdap":{"description":"LDAP Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodLdapId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list to allow client access\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Auth Method description\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the auth method would you like to be notified\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"genKey":{"type":"string","description":"Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided\n"},"gwBoundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list as a trusted Gateway entity\n"},"jwtTtl":{"type":"number","description":"creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)\n"},"name":{"type":"string","description":"Auth Method name\n"},"privateKeyData":{"type":"string","description":"Private key data in Base64 format. This is only returned if the\u003cspan pulumi-lang-nodejs=\" genKey \" pulumi-lang-dotnet=\" GenKey \" pulumi-lang-go=\" genKey \" pulumi-lang-python=\" gen_key \" pulumi-lang-yaml=\" genKey \" pulumi-lang-java=\" genKey \"\u003e gen_key \u003c/span\u003eparameter is set to true.\n","secret":true},"productTypes":{"type":"array","items":{"type":"string"},"description":"Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]\n"},"publicKeyData":{"type":"string","description":"A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object","required":["accessId","authMethodLdapId","name","privateKeyData","publicKeyData"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodLdapId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list to allow client access\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Auth Method description\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the auth method would you like to be notified\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"genKey":{"type":"string","description":"Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided\n"},"gwBoundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list as a trusted Gateway entity\n"},"jwtTtl":{"type":"number","description":"creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)\n"},"name":{"type":"string","description":"Auth Method name\n"},"productTypes":{"type":"array","items":{"type":"string"},"description":"Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]\n"},"publicKeyData":{"type":"string","description":"A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodLdap resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodLdapId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list to allow client access\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Auth Method description\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the auth method would you like to be notified\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"genKey":{"type":"string","description":"Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided\n"},"gwBoundIps":{"type":"array","items":{"type":"string"},"description":"A comma-separated CIDR block list as a trusted Gateway entity\n"},"jwtTtl":{"type":"number","description":"creds expiration time in minutes. If not set, use default according to account settings (see get-account-settings)\n"},"name":{"type":"string","description":"Auth Method name\n"},"privateKeyData":{"type":"string","description":"Private key data in Base64 format. This is only returned if the\u003cspan pulumi-lang-nodejs=\" genKey \" pulumi-lang-dotnet=\" GenKey \" pulumi-lang-go=\" genKey \" pulumi-lang-python=\" gen_key \" pulumi-lang-yaml=\" genKey \" pulumi-lang-java=\" genKey \"\u003e gen_key \u003c/span\u003eparameter is set to true.\n","secret":true},"productTypes":{"type":"array","items":{"type":"string"},"description":"Choose the relevant product type for the auth method [sm, sra, pm, dp, ca]\n"},"publicKeyData":{"type":"string","description":"A public key generated for LDAP authentication method on Akeyless [RSA2048] in Base64 or PEM format\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for LDAP, OAuth2 and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object"}},"akeyless:index/authMethodOauth2:AuthMethodOauth2":{"description":"AOAuth2 Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience in the JWT\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodOauth2Id":{"type":"string","description":"The ID of this resource.\n"},"boundClientIds":{"type":"array","items":{"type":"string"},"description":"The clients ids that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"gatewayUrl":{"type":"string","description":"Akeyless Gateway URL (Configuration Management port). Relevant only when the jwks-uri is accessible only from the gateway.\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwksJsonData":{"type":"string","description":"The JSON Web Key Set (JWKS) containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization serve, in base64 format.\n"},"jwksUri":{"type":"string","description":"The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server.\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object","required":["accessId","authMethodOauth2Id","name","uniqueIdentifier"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"audience":{"type":"string","description":"The audience in the JWT\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodOauth2Id":{"type":"string","description":"The ID of this resource.\n"},"boundClientIds":{"type":"array","items":{"type":"string"},"description":"The clients ids that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"gatewayUrl":{"type":"string","description":"Akeyless Gateway URL (Configuration Management port). Relevant only when the jwks-uri is accessible only from the gateway.\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwksJsonData":{"type":"string","description":"The JSON Web Key Set (JWKS) containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization serve, in base64 format.\n"},"jwksUri":{"type":"string","description":"The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server.\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"requiredInputs":["uniqueIdentifier"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodOauth2 resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"audience":{"type":"string","description":"The audience in the JWT\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodOauth2Id":{"type":"string","description":"The ID of this resource.\n"},"boundClientIds":{"type":"array","items":{"type":"string"},"description":"The clients ids that the access is restricted to\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"gatewayUrl":{"type":"string","description":"Akeyless Gateway URL (Configuration Management port). Relevant only when the jwks-uri is accessible only from the gateway.\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwksJsonData":{"type":"string","description":"The JSON Web Key Set (JWKS) containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization serve, in base64 format.\n"},"jwksUri":{"type":"string","description":"The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server.\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object"}},"akeyless:index/authMethodOidc:AuthMethodOidc":{"description":"OIDC Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"allowedRedirectUris":{"type":"array","items":{"type":"string"},"description":"Allowed redirect URIs after the authentication (default is https://console.akeyless.io/login-oidc to enable OIDC via Akeyless Console and  http://127.0.0.1:* to enable OIDC via akeyless CLI)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodOidcId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"clientId":{"type":"string","description":"Client ID\n"},"clientSecret":{"type":"string","description":"Client Secret\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"requiredScopes":{"type":"array","items":{"type":"string"},"description":"Required scopes that the oidc method will request from the oidc provider and the user must approve\n"},"requiredScopesPrefix":{"type":"string","description":"A prefix to add to all required-scopes when requesting them from the oidc server (for example, azure's Application ID URI)\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OIDC, OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object","required":["accessId","authMethodOidcId","name","uniqueIdentifier"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"allowedRedirectUris":{"type":"array","items":{"type":"string"},"description":"Allowed redirect URIs after the authentication (default is https://console.akeyless.io/login-oidc to enable OIDC via Akeyless Console and  http://127.0.0.1:* to enable OIDC via akeyless CLI)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodOidcId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"clientId":{"type":"string","description":"Client ID\n"},"clientSecret":{"type":"string","description":"Client Secret\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"requiredScopes":{"type":"array","items":{"type":"string"},"description":"Required scopes that the oidc method will request from the oidc provider and the user must approve\n"},"requiredScopesPrefix":{"type":"string","description":"A prefix to add to all required-scopes when requesting them from the oidc server (for example, azure's Application ID URI)\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OIDC, OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"requiredInputs":["uniqueIdentifier"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodOidc resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"allowedRedirectUris":{"type":"array","items":{"type":"string"},"description":"Allowed redirect URIs after the authentication (default is https://console.akeyless.io/login-oidc to enable OIDC via Akeyless Console and  http://127.0.0.1:* to enable OIDC via akeyless CLI)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodOidcId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"clientId":{"type":"string","description":"Client ID\n"},"clientSecret":{"type":"string","description":"Client Secret\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"issuer":{"type":"string","description":"Issuer URL\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"requiredScopes":{"type":"array","items":{"type":"string"},"description":"Required scopes that the oidc method will request from the oidc provider and the user must approve\n"},"requiredScopesPrefix":{"type":"string","description":"A prefix to add to all required-scopes when requesting them from the oidc server (for example, azure's Application ID URI)\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OIDC, OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object"}},"akeyless:index/authMethodSaml:AuthMethodSaml":{"description":"SAML Auth Method Resource\n\n## Import\n\n```sh\n$ pulumi import akeyless:index/authMethodSaml:AuthMethodSaml example /full-auth-method-saml-path/and-name-in-akeyless\n```\n\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"allowedRedirectUris":{"type":"array","items":{"type":"string"},"description":"Allowed redirect URIs after the authentication (default is https://console.akeyless.io/login-saml to enable SAML via Akeyless Console and  http://127.0.0.1:* to enable SAML via akeyless CLI)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodSamlId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"idpMetadataUrl":{"type":"string","description":"IDP metadata url\n"},"idpMetadataXmlData":{"type":"string","description":"IDP metadata xml data for saml authentication\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object","required":["accessId","authMethodSamlId","name","uniqueIdentifier"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"allowedRedirectUris":{"type":"array","items":{"type":"string"},"description":"Allowed redirect URIs after the authentication (default is https://console.akeyless.io/login-saml to enable SAML via Akeyless Console and  http://127.0.0.1:* to enable SAML via akeyless CLI)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodSamlId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"idpMetadataUrl":{"type":"string","description":"IDP metadata url\n"},"idpMetadataXmlData":{"type":"string","description":"IDP metadata xml data for saml authentication\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"requiredInputs":["uniqueIdentifier"],"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodSaml resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"allowedRedirectUris":{"type":"array","items":{"type":"string"},"description":"Allowed redirect URIs after the authentication (default is https://console.akeyless.io/login-saml to enable SAML via Akeyless Console and  http://127.0.0.1:* to enable SAML via akeyless CLI)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodSamlId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"idpMetadataUrl":{"type":"string","description":"IDP metadata url\n"},"idpMetadataXmlData":{"type":"string","description":"IDP metadata xml data for saml authentication\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"uniqueIdentifier":{"type":"string","description":"A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a sub claim that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization.\n"}},"type":"object"}},"akeyless:index/authMethodUniversalIdentity:AuthMethodUniversalIdentity":{"description":"Akeyless Universal Identity Auth Method Resource\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodUniversalIdentityId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"denyInheritance":{"type":"boolean","description":"Deny from root to create children\n"},"denyRotate":{"type":"boolean","description":"Deny from the token to rotate\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"ttl":{"type":"number","description":"Token ttl (in minutes)\n"}},"type":"object","required":["accessId","authMethodUniversalIdentityId","name"],"inputProperties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodUniversalIdentityId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"denyInheritance":{"type":"boolean","description":"Deny from root to create children\n"},"denyRotate":{"type":"boolean","description":"Deny from the token to rotate\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"ttl":{"type":"number","description":"Token ttl (in minutes)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering AuthMethodUniversalIdentity resources.\n","properties":{"accessExpires":{"type":"number","description":"Access expiration date in Unix timestamp (select 0 for access without expiry date)\n"},"accessId":{"type":"string","description":"Auth Method access ID\n"},"auditLogsClaims":{"type":"array","items":{"type":"string"},"description":"Subclaims to include in audit logs\n"},"authMethodUniversalIdentityId":{"type":"string","description":"The ID of this resource.\n"},"boundIps":{"type":"array","items":{"type":"string"},"description":"A CIDR whitelist with the IPs that the access is restricted to\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"denyInheritance":{"type":"boolean","description":"Deny from root to create children\n"},"denyRotate":{"type":"boolean","description":"Deny from the token to rotate\n"},"forceSubClaims":{"type":"boolean","description":"enforce role-association must include sub claims\n"},"jwtTtl":{"type":"number","description":"Creds expiration time in minutes\n"},"name":{"type":"string","description":"Auth Method name\n"},"ttl":{"type":"number","description":"Token ttl (in minutes)\n"}},"type":"object"}},"akeyless:index/certificate:Certificate":{"description":"Certificate Resource\n","properties":{"certificateData":{"type":"string","description":"Content of the certificate in a Base64 format.\n","secret":true},"certificateId":{"type":"string","description":"The ID of this resource.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"format":{"type":"string","description":"CertificateFormat of the certificate and private key, possible values: cer,crt,pem,pfx,p12.\n"},"key":{"type":"string","description":"The name of a key to use to encrypt the certificate's key (if empty, the account default protectionKey key will be used)\n"},"keyData":{"type":"string","description":"Content of the certificate's private key in a Base64 format.\n","secret":true},"name":{"type":"string","description":"Certificate name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"Add tags attached to this object. To specify multiple tags use argument multiple times: --tag Tag1 -t Tag2\n"}},"type":"object","required":["certificateData","certificateId","deleteProtection","key","name"],"inputProperties":{"certificateData":{"type":"string","description":"Content of the certificate in a Base64 format.\n","secret":true},"certificateId":{"type":"string","description":"The ID of this resource.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"format":{"type":"string","description":"CertificateFormat of the certificate and private key, possible values: cer,crt,pem,pfx,p12.\n"},"key":{"type":"string","description":"The name of a key to use to encrypt the certificate's key (if empty, the account default protectionKey key will be used)\n"},"keyData":{"type":"string","description":"Content of the certificate's private key in a Base64 format.\n","secret":true},"name":{"type":"string","description":"Certificate name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"Add tags attached to this object. To specify multiple tags use argument multiple times: --tag Tag1 -t Tag2\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering Certificate resources.\n","properties":{"certificateData":{"type":"string","description":"Content of the certificate in a Base64 format.\n","secret":true},"certificateId":{"type":"string","description":"The ID of this resource.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"format":{"type":"string","description":"CertificateFormat of the certificate and private key, possible values: cer,crt,pem,pfx,p12.\n"},"key":{"type":"string","description":"The name of a key to use to encrypt the certificate's key (if empty, the account default protectionKey key will be used)\n"},"keyData":{"type":"string","description":"Content of the certificate's private key in a Base64 format.\n","secret":true},"name":{"type":"string","description":"Certificate name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"Add tags attached to this object. To specify multiple tags use argument multiple times: --tag Tag1 -t Tag2\n"}},"type":"object"}},"akeyless:index/classicKey:ClassicKey":{"description":"Classic Key resource\n","properties":{"alg":{"type":"string","description":"Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false]\n"},"certFileData":{"type":"string","description":"PEM Certificate in a Base64 format.\n"},"certificateCommonName":{"type":"string","description":"Common name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateCountry":{"type":"string","description":"Country name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateFormat":{"type":"string","description":"The format of the returned certificate [pem/der]\n"},"certificateLocality":{"type":"string","description":"Locality for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateOrganization":{"type":"string","description":"Organization name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateProvince":{"type":"string","description":"Province name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateTtl":{"type":"number","description":"TTL in days for the generated certificate. Required only for generate-self-signed-certificate.\n"},"classicKeyId":{"type":"string","description":"The ID of this resource.\n"},"confFileData":{"type":"string","description":"The csr config data in base64 encoding\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"generateSelfSignedCertificate":{"type":"boolean","description":"Whether to generate a self signed certificate with the key. If set,\u003cspan pulumi-lang-nodejs=\" certificateTtl \" pulumi-lang-dotnet=\" CertificateTtl \" pulumi-lang-go=\" certificateTtl \" pulumi-lang-python=\" certificate_ttl \" pulumi-lang-yaml=\" certificateTtl \" pulumi-lang-java=\" certificateTtl \"\u003e certificate_ttl \u003c/span\u003emust be provided.\n"},"gpgAlg":{"type":"string","description":"gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519]\n"},"keyData":{"type":"string","description":"Base64-encoded classic key value provided by user\n","secret":true},"name":{"type":"string","description":"Classic key name\n"},"protectionKeyName":{"type":"string","description":"The name of the key that protects the classic key value (if empty, the account default key will be used)\n"},"rotationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the rotation of the item would you like to be notified.\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key\n"}},"type":"object","required":["alg","certFileData","classicKeyId","deleteProtection","name","protectionKeyName"],"inputProperties":{"alg":{"type":"string","description":"Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false]\n"},"certFileData":{"type":"string","description":"PEM Certificate in a Base64 format.\n"},"certificateCommonName":{"type":"string","description":"Common name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateCountry":{"type":"string","description":"Country name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateFormat":{"type":"string","description":"The format of the returned certificate [pem/der]\n"},"certificateLocality":{"type":"string","description":"Locality for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateOrganization":{"type":"string","description":"Organization name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateProvince":{"type":"string","description":"Province name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateTtl":{"type":"number","description":"TTL in days for the generated certificate. Required only for generate-self-signed-certificate.\n"},"classicKeyId":{"type":"string","description":"The ID of this resource.\n"},"confFileData":{"type":"string","description":"The csr config data in base64 encoding\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"generateSelfSignedCertificate":{"type":"boolean","description":"Whether to generate a self signed certificate with the key. If set,\u003cspan pulumi-lang-nodejs=\" certificateTtl \" pulumi-lang-dotnet=\" CertificateTtl \" pulumi-lang-go=\" certificateTtl \" pulumi-lang-python=\" certificate_ttl \" pulumi-lang-yaml=\" certificateTtl \" pulumi-lang-java=\" certificateTtl \"\u003e certificate_ttl \u003c/span\u003emust be provided.\n"},"gpgAlg":{"type":"string","description":"gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519]\n"},"keyData":{"type":"string","description":"Base64-encoded classic key value provided by user\n","secret":true},"name":{"type":"string","description":"Classic key name\n"},"protectionKeyName":{"type":"string","description":"The name of the key that protects the classic key value (if empty, the account default key will be used)\n"},"rotationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the rotation of the item would you like to be notified.\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key\n"}},"requiredInputs":["alg"],"stateInputs":{"description":"Input properties used for looking up and filtering ClassicKey resources.\n","properties":{"alg":{"type":"string","description":"Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false]\n"},"certFileData":{"type":"string","description":"PEM Certificate in a Base64 format.\n"},"certificateCommonName":{"type":"string","description":"Common name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateCountry":{"type":"string","description":"Country name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateFormat":{"type":"string","description":"The format of the returned certificate [pem/der]\n"},"certificateLocality":{"type":"string","description":"Locality for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateOrganization":{"type":"string","description":"Organization name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateProvince":{"type":"string","description":"Province name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateTtl":{"type":"number","description":"TTL in days for the generated certificate. Required only for generate-self-signed-certificate.\n"},"classicKeyId":{"type":"string","description":"The ID of this resource.\n"},"confFileData":{"type":"string","description":"The csr config data in base64 encoding\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"generateSelfSignedCertificate":{"type":"boolean","description":"Whether to generate a self signed certificate with the key. If set,\u003cspan pulumi-lang-nodejs=\" certificateTtl \" pulumi-lang-dotnet=\" CertificateTtl \" pulumi-lang-go=\" certificateTtl \" pulumi-lang-python=\" certificate_ttl \" pulumi-lang-yaml=\" certificateTtl \" pulumi-lang-java=\" certificateTtl \"\u003e certificate_ttl \u003c/span\u003emust be provided.\n"},"gpgAlg":{"type":"string","description":"gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519]\n"},"keyData":{"type":"string","description":"Base64-encoded classic key value provided by user\n","secret":true},"name":{"type":"string","description":"Classic key name\n"},"protectionKeyName":{"type":"string","description":"The name of the key that protects the classic key value (if empty, the account default key will be used)\n"},"rotationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the rotation of the item would you like to be notified.\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key\n"}},"type":"object"}},"akeyless:index/dfcKey:DfcKey":{"description":"DFC Key resource\n","properties":{"alg":{"type":"string","description":"DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every\u003cspan pulumi-lang-nodejs=\" rotationInterval \" pulumi-lang-dotnet=\" RotationInterval \" pulumi-lang-go=\" rotationInterval \" pulumi-lang-python=\" rotation_interval \" pulumi-lang-yaml=\" rotationInterval \" pulumi-lang-java=\" rotationInterval \"\u003e rotation_interval \u003c/span\u003edays, or disable existing automatic rotation [true/false]\n"},"certDataBase64":{"type":"string","description":"PEM Certificate in a Base64 format. Used for updating RSA keys' certificates\n"},"certificateCommonName":{"type":"string","description":"Common name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateCountry":{"type":"string","description":"Country name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateFormat":{"type":"string","description":"The format of the returned certificate [pem/der]\n"},"certificateLocality":{"type":"string","description":"Locality for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateOrganization":{"type":"string","description":"Organization name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateProvince":{"type":"string","description":"Province name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateTtl":{"type":"number","description":"TTL in days for the generated certificate. Required only for generate-self-signed-certificate.\n"},"confFileData":{"type":"string","description":"The csr config data in base64 encoding\n"},"customerFrgId":{"type":"string","description":"The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment)\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"dfcKeyId":{"type":"string","description":"The ID of this resource.\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"generateSelfSignedCertificate":{"type":"boolean","description":"Whether to generate a self signed certificate with the key. If set, certificate-ttl must be provided.\n"},"name":{"type":"string","description":"DFCKey name\n"},"rotationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the rotation of the item would you like to be notified.\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (7-365)\n"},"splitLevel":{"type":"number","description":"The number of fragments that the item will be split into (not includes customer fragment)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this DFC key\n"}},"type":"object","required":["alg","certDataBase64","dfcKeyId","name"],"inputProperties":{"alg":{"type":"string","description":"DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every\u003cspan pulumi-lang-nodejs=\" rotationInterval \" pulumi-lang-dotnet=\" RotationInterval \" pulumi-lang-go=\" rotationInterval \" pulumi-lang-python=\" rotation_interval \" pulumi-lang-yaml=\" rotationInterval \" pulumi-lang-java=\" rotationInterval \"\u003e rotation_interval \u003c/span\u003edays, or disable existing automatic rotation [true/false]\n"},"certDataBase64":{"type":"string","description":"PEM Certificate in a Base64 format. Used for updating RSA keys' certificates\n"},"certificateCommonName":{"type":"string","description":"Common name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateCountry":{"type":"string","description":"Country name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateFormat":{"type":"string","description":"The format of the returned certificate [pem/der]\n"},"certificateLocality":{"type":"string","description":"Locality for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateOrganization":{"type":"string","description":"Organization name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateProvince":{"type":"string","description":"Province name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateTtl":{"type":"number","description":"TTL in days for the generated certificate. Required only for generate-self-signed-certificate.\n"},"confFileData":{"type":"string","description":"The csr config data in base64 encoding\n"},"customerFrgId":{"type":"string","description":"The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment)\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"dfcKeyId":{"type":"string","description":"The ID of this resource.\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"generateSelfSignedCertificate":{"type":"boolean","description":"Whether to generate a self signed certificate with the key. If set, certificate-ttl must be provided.\n"},"name":{"type":"string","description":"DFCKey name\n"},"rotationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the rotation of the item would you like to be notified.\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (7-365)\n"},"splitLevel":{"type":"number","description":"The number of fragments that the item will be split into (not includes customer fragment)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this DFC key\n"}},"requiredInputs":["alg"],"stateInputs":{"description":"Input properties used for looking up and filtering DfcKey resources.\n","properties":{"alg":{"type":"string","description":"DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every\u003cspan pulumi-lang-nodejs=\" rotationInterval \" pulumi-lang-dotnet=\" RotationInterval \" pulumi-lang-go=\" rotationInterval \" pulumi-lang-python=\" rotation_interval \" pulumi-lang-yaml=\" rotationInterval \" pulumi-lang-java=\" rotationInterval \"\u003e rotation_interval \u003c/span\u003edays, or disable existing automatic rotation [true/false]\n"},"certDataBase64":{"type":"string","description":"PEM Certificate in a Base64 format. Used for updating RSA keys' certificates\n"},"certificateCommonName":{"type":"string","description":"Common name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateCountry":{"type":"string","description":"Country name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateFormat":{"type":"string","description":"The format of the returned certificate [pem/der]\n"},"certificateLocality":{"type":"string","description":"Locality for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateOrganization":{"type":"string","description":"Organization name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateProvince":{"type":"string","description":"Province name for the generated certificate. Relevant only for generate-self-signed-certificate.\n"},"certificateTtl":{"type":"number","description":"TTL in days for the generated certificate. Required only for generate-self-signed-certificate.\n"},"confFileData":{"type":"string","description":"The csr config data in base64 encoding\n"},"customerFrgId":{"type":"string","description":"The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment)\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"dfcKeyId":{"type":"string","description":"The ID of this resource.\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified.\n"},"generateSelfSignedCertificate":{"type":"boolean","description":"Whether to generate a self signed certificate with the key. If set, certificate-ttl must be provided.\n"},"name":{"type":"string","description":"DFCKey name\n"},"rotationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the rotation of the item would you like to be notified.\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (7-365)\n"},"splitLevel":{"type":"number","description":"The number of fragments that the item will be split into (not includes customer fragment)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this DFC key\n"}},"type":"object"}},"akeyless:index/dynamicSecretArtifactory:DynamicSecretArtifactory":{"description":"Artifactory dynamic secret resource\n","properties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"artifactoryTokenAudience":{"type":"string","description":"A space-separate list of the other Artifactory instances or services that should accept this token., for example: jfrt@*\n"},"artifactoryTokenScope":{"type":"string","description":"Token scope provided as a space-separated list, for example: member-of-groups:readers\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretArtifactoryId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic Secret name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["artifactoryTokenAudience","artifactoryTokenScope","dynamicSecretArtifactoryId","name"],"inputProperties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"artifactoryTokenAudience":{"type":"string","description":"A space-separate list of the other Artifactory instances or services that should accept this token., for example: jfrt@*\n"},"artifactoryTokenScope":{"type":"string","description":"Token scope provided as a space-separated list, for example: member-of-groups:readers\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretArtifactoryId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic Secret name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"requiredInputs":["artifactoryTokenAudience","artifactoryTokenScope"],"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretArtifactory resources.\n","properties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"artifactoryTokenAudience":{"type":"string","description":"A space-separate list of the other Artifactory instances or services that should accept this token., for example: jfrt@*\n"},"artifactoryTokenScope":{"type":"string","description":"Token scope provided as a space-separated list, for example: member-of-groups:readers\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretArtifactoryId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic Secret name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretAws:DynamicSecretAws":{"description":"AWS dynamic secret resource\n","properties":{"accessMode":{"type":"string","description":"The types of credentials to retrieve from AWS. Options:[iam*user,assume*role]\n"},"awsAccessKeyId":{"type":"string","description":"Access Key ID\n"},"awsAccessSecretKey":{"type":"string","description":"Access Secret Key\n","secret":true},"awsRoleArns":{"type":"string","description":"AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma\n"},"awsUserConsoleAccess":{"type":"boolean","description":"Enable AWS User console access\n"},"awsUserGroups":{"type":"string","description":"UserGroup name(s). Multiple values should be separated by comma\n"},"awsUserPolicies":{"type":"string","description":"Policy ARN(s). Multiple values should be separated by comma\n"},"awsUserProgrammaticAccess":{"type":"boolean","description":"Enable AWS User programmatic access\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretAwsId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"region":{"type":"string","description":"Region\n"},"secureAccessAwsAccountId":{"type":"string","description":"The aws account id\n"},"secureAccessAwsNativeCli":{"type":"boolean","description":"The aws native cli\n"},"secureAccessAwsRegion":{"type":"string"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretAwsId","name","secureAccessAwsRegion","secureAccessUrl"],"inputProperties":{"accessMode":{"type":"string","description":"The types of credentials to retrieve from AWS. Options:[iam*user,assume*role]\n"},"awsAccessKeyId":{"type":"string","description":"Access Key ID\n"},"awsAccessSecretKey":{"type":"string","description":"Access Secret Key\n","secret":true},"awsRoleArns":{"type":"string","description":"AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma\n"},"awsUserConsoleAccess":{"type":"boolean","description":"Enable AWS User console access\n"},"awsUserGroups":{"type":"string","description":"UserGroup name(s). Multiple values should be separated by comma\n"},"awsUserPolicies":{"type":"string","description":"Policy ARN(s). Multiple values should be separated by comma\n"},"awsUserProgrammaticAccess":{"type":"boolean","description":"Enable AWS User programmatic access\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretAwsId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"region":{"type":"string","description":"Region\n"},"secureAccessAwsAccountId":{"type":"string","description":"The aws account id\n"},"secureAccessAwsNativeCli":{"type":"boolean","description":"The aws native cli\n"},"secureAccessAwsRegion":{"type":"string"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretAws resources.\n","properties":{"accessMode":{"type":"string","description":"The types of credentials to retrieve from AWS. Options:[iam*user,assume*role]\n"},"awsAccessKeyId":{"type":"string","description":"Access Key ID\n"},"awsAccessSecretKey":{"type":"string","description":"Access Secret Key\n","secret":true},"awsRoleArns":{"type":"string","description":"AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma\n"},"awsUserConsoleAccess":{"type":"boolean","description":"Enable AWS User console access\n"},"awsUserGroups":{"type":"string","description":"UserGroup name(s). Multiple values should be separated by comma\n"},"awsUserPolicies":{"type":"string","description":"Policy ARN(s). Multiple values should be separated by comma\n"},"awsUserProgrammaticAccess":{"type":"boolean","description":"Enable AWS User programmatic access\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretAwsId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"region":{"type":"string","description":"Region\n"},"secureAccessAwsAccountId":{"type":"string","description":"The aws account id\n"},"secureAccessAwsNativeCli":{"type":"boolean","description":"The aws native cli\n"},"secureAccessAwsRegion":{"type":"string"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretAzure:DynamicSecretAzure":{"description":"Azure AD dynamic secret resource\n","properties":{"appObjId":{"type":"string","description":"Azure App Object ID (required if selected programmatic access)\n"},"azureClientId":{"type":"string","description":"Azure Client ID (Application ID)\n"},"azureClientSecret":{"type":"string","description":"Azure AD Client Secret\n","secret":true},"azureTenantId":{"type":"string","description":"Azure Tenant ID\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretAzureId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userGroupObjId":{"type":"string","description":"Azure AD User Group Object ID (required if selected Portal access)\n"},"userPortalAccess":{"type":"boolean","description":"Enable Azure AD user portal access\n"},"userPrincipalName":{"type":"string","description":"Azure AD User Principal Name (required if selected Portal access)\n"},"userProgrammaticAccess":{"type":"boolean","description":"Enable Azure AD user programmatic access\n"},"userRoleTemplateId":{"type":"string","description":"Azure AD User Role Template ID (required if selected Portal access)\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretAzureId","name","secureAccessUrl"],"inputProperties":{"appObjId":{"type":"string","description":"Azure App Object ID (required if selected programmatic access)\n"},"azureClientId":{"type":"string","description":"Azure Client ID (Application ID)\n"},"azureClientSecret":{"type":"string","description":"Azure AD Client Secret\n","secret":true},"azureTenantId":{"type":"string","description":"Azure Tenant ID\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretAzureId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userGroupObjId":{"type":"string","description":"Azure AD User Group Object ID (required if selected Portal access)\n"},"userPortalAccess":{"type":"boolean","description":"Enable Azure AD user portal access\n"},"userPrincipalName":{"type":"string","description":"Azure AD User Principal Name (required if selected Portal access)\n"},"userProgrammaticAccess":{"type":"boolean","description":"Enable Azure AD user programmatic access\n"},"userRoleTemplateId":{"type":"string","description":"Azure AD User Role Template ID (required if selected Portal access)\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretAzure resources.\n","properties":{"appObjId":{"type":"string","description":"Azure App Object ID (required if selected programmatic access)\n"},"azureClientId":{"type":"string","description":"Azure Client ID (Application ID)\n"},"azureClientSecret":{"type":"string","description":"Azure AD Client Secret\n","secret":true},"azureTenantId":{"type":"string","description":"Azure Tenant ID\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretAzureId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userGroupObjId":{"type":"string","description":"Azure AD User Group Object ID (required if selected Portal access)\n"},"userPortalAccess":{"type":"boolean","description":"Enable Azure AD user portal access\n"},"userPrincipalName":{"type":"string","description":"Azure AD User Principal Name (required if selected Portal access)\n"},"userProgrammaticAccess":{"type":"boolean","description":"Enable Azure AD user programmatic access\n"},"userRoleTemplateId":{"type":"string","description":"Azure AD User Role Template ID (required if selected Portal access)\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretCassandra:DynamicSecretCassandra":{"description":"Cassandra dynamic secret resource\n","properties":{"cassandraCreationStatements":{"type":"string","description":"Cassandra Creation Statements\n"},"cassandraHosts":{"type":"string","description":"Cassandra hosts names or IP addresses, comma separated\n"},"cassandraPassword":{"type":"string","description":"Cassandra superuser password\n"},"cassandraPort":{"type":"string","description":"Cassandra port\n"},"cassandraUsername":{"type":"string","description":"Cassandra superuser user name\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretCassandraId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object","required":["dynamicSecretCassandraId","name"],"inputProperties":{"cassandraCreationStatements":{"type":"string","description":"Cassandra Creation Statements\n"},"cassandraHosts":{"type":"string","description":"Cassandra hosts names or IP addresses, comma separated\n"},"cassandraPassword":{"type":"string","description":"Cassandra superuser password\n"},"cassandraPort":{"type":"string","description":"Cassandra port\n"},"cassandraUsername":{"type":"string","description":"Cassandra superuser user name\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretCassandraId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretCassandra resources.\n","properties":{"cassandraCreationStatements":{"type":"string","description":"Cassandra Creation Statements\n"},"cassandraHosts":{"type":"string","description":"Cassandra hosts names or IP addresses, comma separated\n"},"cassandraPassword":{"type":"string","description":"Cassandra superuser password\n"},"cassandraPort":{"type":"string","description":"Cassandra port\n"},"cassandraUsername":{"type":"string","description":"Cassandra superuser user name\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretCassandraId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object"}},"akeyless:index/dynamicSecretCustom:DynamicSecretCustom":{"description":"Custom dynamic secret resource\n","properties":{"adminRotationIntervalDays":{"type":"number","description":"Rotation period in days\n"},"createSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/create method\n"},"dynamicSecretCustomId":{"type":"string","description":"The ID of this resource.\n"},"enableAdminRotation":{"type":"boolean","description":"Enable automatic admin credentials rotation\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"payload":{"type":"string","description":"Secret payload to be sent with each create/revoke webhook request\n"},"revokeSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/revoke method\n"},"rotateSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/rotate method\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"timeoutSec":{"type":"number","description":"Maximum allowed time in seconds for the webhook to return the results\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["createSyncUrl","dynamicSecretCustomId","name","revokeSyncUrl"],"inputProperties":{"adminRotationIntervalDays":{"type":"number","description":"Rotation period in days\n"},"createSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/create method\n"},"dynamicSecretCustomId":{"type":"string","description":"The ID of this resource.\n"},"enableAdminRotation":{"type":"boolean","description":"Enable automatic admin credentials rotation\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"payload":{"type":"string","description":"Secret payload to be sent with each create/revoke webhook request\n"},"revokeSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/revoke method\n"},"rotateSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/rotate method\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"timeoutSec":{"type":"number","description":"Maximum allowed time in seconds for the webhook to return the results\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"requiredInputs":["createSyncUrl","revokeSyncUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretCustom resources.\n","properties":{"adminRotationIntervalDays":{"type":"number","description":"Rotation period in days\n"},"createSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/create method\n"},"dynamicSecretCustomId":{"type":"string","description":"The ID of this resource.\n"},"enableAdminRotation":{"type":"boolean","description":"Enable automatic admin credentials rotation\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"payload":{"type":"string","description":"Secret payload to be sent with each create/revoke webhook request\n"},"revokeSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/revoke method\n"},"rotateSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/rotate method\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"timeoutSec":{"type":"number","description":"Maximum allowed time in seconds for the webhook to return the results\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretEks:DynamicSecretEks":{"description":"Amazon Elastic Kubernetes Service (Amazon EKS) dynamic secret\n","properties":{"dynamicSecretEksId":{"type":"string","description":"The ID of this resource.\n"},"eksAccessKeyId":{"type":"string","description":"EKS Access Key ID\n"},"eksAssumeRole":{"type":"string","description":"Role ARN. Role to assume when connecting to the EKS cluster\n"},"eksClusterCaCert":{"type":"string","description":"EKS Cluster certificate. Base 64 encoded certificate.\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"eksClusterName":{"type":"string","description":"EKS cluster name. Must match the EKS cluster name you want to connect to.\n"},"eksRegion":{"type":"string","description":"EKS Region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS Secret Access Key\n","secret":true},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretEksId","name"],"inputProperties":{"dynamicSecretEksId":{"type":"string","description":"The ID of this resource.\n"},"eksAccessKeyId":{"type":"string","description":"EKS Access Key ID\n"},"eksAssumeRole":{"type":"string","description":"Role ARN. Role to assume when connecting to the EKS cluster\n"},"eksClusterCaCert":{"type":"string","description":"EKS Cluster certificate. Base 64 encoded certificate.\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"eksClusterName":{"type":"string","description":"EKS cluster name. Must match the EKS cluster name you want to connect to.\n"},"eksRegion":{"type":"string","description":"EKS Region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS Secret Access Key\n","secret":true},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretEks resources.\n","properties":{"dynamicSecretEksId":{"type":"string","description":"The ID of this resource.\n"},"eksAccessKeyId":{"type":"string","description":"EKS Access Key ID\n"},"eksAssumeRole":{"type":"string","description":"Role ARN. Role to assume when connecting to the EKS cluster\n"},"eksClusterCaCert":{"type":"string","description":"EKS Cluster certificate. Base 64 encoded certificate.\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"eksClusterName":{"type":"string","description":"EKS cluster name. Must match the EKS cluster name you want to connect to.\n"},"eksRegion":{"type":"string","description":"EKS Region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS Secret Access Key\n","secret":true},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretGcp:DynamicSecretGcp":{"description":"Google Cloud Provider (GCP) dynamic secret resource\n","properties":{"accessType":{"type":"string","description":"The type of the GCP dynamic secret, options are [sa, external]\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"dynamicSecretGcpId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"fixedUserClaimKeyname":{"type":"string","description":"For externally provided users, denotes the key-name of IdP claim to extract the username from\n"},"gcpCredType":{"type":"string","description":"Credentials type, options are [token, key]\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpKeyAlgo":{"type":"string","description":"Service account key algorithm, e.g. KEY*ALG*RSA_1024\n"},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"gcpTokenScopes":{"type":"string","description":"Access token scopes list, e.g. scope1,scope2\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"projectId":{"type":"string","description":"GCP Project ID override for dynamic secret operations\n"},"roleBinding":{"type":"string","description":"Role binding definitions in json format\n"},"roleNames":{"type":"string","description":"Comma-separated list of GCP roles to assign to the user\n"},"serviceAccountType":{"type":"string","description":"The type of the gcp dynamic secret. Options[fixed, dynamic]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object","required":["dynamicSecretGcpId","name"],"inputProperties":{"accessType":{"type":"string","description":"The type of the GCP dynamic secret, options are [sa, external]\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"dynamicSecretGcpId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"fixedUserClaimKeyname":{"type":"string","description":"For externally provided users, denotes the key-name of IdP claim to extract the username from\n"},"gcpCredType":{"type":"string","description":"Credentials type, options are [token, key]\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpKeyAlgo":{"type":"string","description":"Service account key algorithm, e.g. KEY*ALG*RSA_1024\n"},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"gcpTokenScopes":{"type":"string","description":"Access token scopes list, e.g. scope1,scope2\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"projectId":{"type":"string","description":"GCP Project ID override for dynamic secret operations\n"},"roleBinding":{"type":"string","description":"Role binding definitions in json format\n"},"roleNames":{"type":"string","description":"Comma-separated list of GCP roles to assign to the user\n"},"serviceAccountType":{"type":"string","description":"The type of the gcp dynamic secret. Options[fixed, dynamic]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretGcp resources.\n","properties":{"accessType":{"type":"string","description":"The type of the GCP dynamic secret, options are [sa, external]\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"dynamicSecretGcpId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"fixedUserClaimKeyname":{"type":"string","description":"For externally provided users, denotes the key-name of IdP claim to extract the username from\n"},"gcpCredType":{"type":"string","description":"Credentials type, options are [token, key]\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpKeyAlgo":{"type":"string","description":"Service account key algorithm, e.g. KEY*ALG*RSA_1024\n"},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"gcpTokenScopes":{"type":"string","description":"Access token scopes list, e.g. scope1,scope2\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"projectId":{"type":"string","description":"GCP Project ID override for dynamic secret operations\n"},"roleBinding":{"type":"string","description":"Role binding definitions in json format\n"},"roleNames":{"type":"string","description":"Comma-separated list of GCP roles to assign to the user\n"},"serviceAccountType":{"type":"string","description":"The type of the gcp dynamic secret. Options[fixed, dynamic]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object"}},"akeyless:index/dynamicSecretGithub:DynamicSecretGithub":{"description":"Github dynamic secret resource\n","properties":{"dynamicSecretGithubId":{"type":"string","description":"The ID of this resource.\n"},"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"installationId":{"type":"number","description":"Github application installation id\n"},"installationOrganization":{"type":"string","description":"Instead of installation id, set a GitHub organization name\n"},"installationRepository":{"type":"string","description":"Instead of installation id, set a GitHub repository '\\n\\n/\\n\\n'\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"tokenPermissions":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed permissions. By default use installation allowed permissions. Input format: key=value pairs or JSON strings, e.g - -p contents=read -p issues=write or -p '{content:read}'\n"},"tokenRepositories":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed repositories. By default use installation allowed repositories. To specify multiple repositories use argument multiple times: -r RepoName1 -r RepoName2\n"},"tokenTtl":{"type":"string","description":"Token TTL\n"}},"type":"object","required":["dynamicSecretGithubId","name"],"inputProperties":{"dynamicSecretGithubId":{"type":"string","description":"The ID of this resource.\n"},"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"installationId":{"type":"number","description":"Github application installation id\n"},"installationOrganization":{"type":"string","description":"Instead of installation id, set a GitHub organization name\n"},"installationRepository":{"type":"string","description":"Instead of installation id, set a GitHub repository '\\n\\n/\\n\\n'\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"tokenPermissions":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed permissions. By default use installation allowed permissions. Input format: key=value pairs or JSON strings, e.g - -p contents=read -p issues=write or -p '{content:read}'\n"},"tokenRepositories":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed repositories. By default use installation allowed repositories. To specify multiple repositories use argument multiple times: -r RepoName1 -r RepoName2\n"},"tokenTtl":{"type":"string","description":"Token TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretGithub resources.\n","properties":{"dynamicSecretGithubId":{"type":"string","description":"The ID of this resource.\n"},"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"installationId":{"type":"number","description":"Github application installation id\n"},"installationOrganization":{"type":"string","description":"Instead of installation id, set a GitHub organization name\n"},"installationRepository":{"type":"string","description":"Instead of installation id, set a GitHub repository '\\n\\n/\\n\\n'\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"tokenPermissions":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed permissions. By default use installation allowed permissions. Input format: key=value pairs or JSON strings, e.g - -p contents=read -p issues=write or -p '{content:read}'\n"},"tokenRepositories":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed repositories. By default use installation allowed repositories. To specify multiple repositories use argument multiple times: -r RepoName1 -r RepoName2\n"},"tokenTtl":{"type":"string","description":"Token TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretGitlab:DynamicSecretGitlab":{"description":"Gitlab dynamic secret resource.\n","properties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"dynamicSecretGitlabId":{"type":"string","description":"The ID of this resource.\n"},"gitlabAccessToken":{"type":"string","description":"Gitlab access token\n","secret":true},"gitlabAccessType":{"type":"string","description":"Gitlab access token type [project,group]\n"},"gitlabCertificate":{"type":"string","description":"Gitlab tls certificate (base64 encoded)\n","secret":true},"gitlabRole":{"type":"string","description":"Gitlab role\n"},"gitlabTokenScopes":{"type":"string","description":"Comma-separated list of access token scopes to grant\n"},"gitlabUrl":{"type":"string","description":"Gitlab base url\n"},"groupName":{"type":"string","description":"Gitlab group name, required for access-type=group\n"},"installationOrganization":{"type":"string","description":"Gitlab project name, required for access-type=project\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of tags attached to this secret\n"},"targetName":{"type":"string","description":"Name of an existing target\n"},"ttl":{"type":"string","description":"Access Token TTL\n"}},"type":"object","required":["dynamicSecretGitlabId","name"],"inputProperties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"dynamicSecretGitlabId":{"type":"string","description":"The ID of this resource.\n"},"gitlabAccessToken":{"type":"string","description":"Gitlab access token\n","secret":true},"gitlabAccessType":{"type":"string","description":"Gitlab access token type [project,group]\n"},"gitlabCertificate":{"type":"string","description":"Gitlab tls certificate (base64 encoded)\n","secret":true},"gitlabRole":{"type":"string","description":"Gitlab role\n"},"gitlabTokenScopes":{"type":"string","description":"Comma-separated list of access token scopes to grant\n"},"gitlabUrl":{"type":"string","description":"Gitlab base url\n"},"groupName":{"type":"string","description":"Gitlab group name, required for access-type=group\n"},"installationOrganization":{"type":"string","description":"Gitlab project name, required for access-type=project\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of tags attached to this secret\n"},"targetName":{"type":"string","description":"Name of an existing target\n"},"ttl":{"type":"string","description":"Access Token TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretGitlab resources.\n","properties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"dynamicSecretGitlabId":{"type":"string","description":"The ID of this resource.\n"},"gitlabAccessToken":{"type":"string","description":"Gitlab access token\n","secret":true},"gitlabAccessType":{"type":"string","description":"Gitlab access token type [project,group]\n"},"gitlabCertificate":{"type":"string","description":"Gitlab tls certificate (base64 encoded)\n","secret":true},"gitlabRole":{"type":"string","description":"Gitlab role\n"},"gitlabTokenScopes":{"type":"string","description":"Comma-separated list of access token scopes to grant\n"},"gitlabUrl":{"type":"string","description":"Gitlab base url\n"},"groupName":{"type":"string","description":"Gitlab group name, required for access-type=group\n"},"installationOrganization":{"type":"string","description":"Gitlab project name, required for access-type=project\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of tags attached to this secret\n"},"targetName":{"type":"string","description":"Name of an existing target\n"},"ttl":{"type":"string","description":"Access Token TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretGke:DynamicSecretGke":{"description":"Google Kubernetes Engine (GKE) dynamic secret resource\n","properties":{"dynamicSecretGkeId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretGkeId","name"],"inputProperties":{"dynamicSecretGkeId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretGke resources.\n","properties":{"dynamicSecretGkeId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretK8s:DynamicSecretK8s":{"description":"Native Kubernetes Service dynamic secret resource\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item [true/false]\n"},"dynamicSecretK8sId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"k8sAllowedNamespaces":{"type":"string","description":"Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n","secret":true},"k8sNamespace":{"type":"string","description":"K8S Namespace where the ServiceAccount exists.\n"},"k8sPredefinedRoleName":{"type":"string","description":"The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).\n"},"k8sPredefinedRoleType":{"type":"string","description":"Specifies the type of the pre-existing K8S role Role, ClusterRole.\n"},"k8sServiceAccount":{"type":"string","description":"K8S ServiceAccount to extract token from.\n"},"k8sServiceAccountType":{"type":"string","description":"K8S ServiceAccount type [fixed, dynamic].\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint\n"},"secureAccessDashboardUrl":{"type":"string","description":"The K8s dashboard url\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"secureAccessWebProxy":{"type":"boolean","description":"Web-Proxy via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretK8sId","name"],"inputProperties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item [true/false]\n"},"dynamicSecretK8sId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"k8sAllowedNamespaces":{"type":"string","description":"Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n","secret":true},"k8sNamespace":{"type":"string","description":"K8S Namespace where the ServiceAccount exists.\n"},"k8sPredefinedRoleName":{"type":"string","description":"The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).\n"},"k8sPredefinedRoleType":{"type":"string","description":"Specifies the type of the pre-existing K8S role Role, ClusterRole.\n"},"k8sServiceAccount":{"type":"string","description":"K8S ServiceAccount to extract token from.\n"},"k8sServiceAccountType":{"type":"string","description":"K8S ServiceAccount type [fixed, dynamic].\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint\n"},"secureAccessDashboardUrl":{"type":"string","description":"The K8s dashboard url\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"secureAccessWebProxy":{"type":"boolean","description":"Web-Proxy via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretK8s resources.\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item [true/false]\n"},"dynamicSecretK8sId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"k8sAllowedNamespaces":{"type":"string","description":"Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n","secret":true},"k8sNamespace":{"type":"string","description":"K8S Namespace where the ServiceAccount exists.\n"},"k8sPredefinedRoleName":{"type":"string","description":"The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).\n"},"k8sPredefinedRoleType":{"type":"string","description":"Specifies the type of the pre-existing K8S role Role, ClusterRole.\n"},"k8sServiceAccount":{"type":"string","description":"K8S ServiceAccount to extract token from.\n"},"k8sServiceAccountType":{"type":"string","description":"K8S ServiceAccount type [fixed, dynamic].\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint\n"},"secureAccessDashboardUrl":{"type":"string","description":"The K8s dashboard url\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"secureAccessWebProxy":{"type":"boolean","description":"Web-Proxy via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretMongodb:DynamicSecretMongodb":{"description":"Mongo DB dynamic secret resource\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretMongodbId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbHostPort":{"type":"string","description":"host:port (e.g. my.mongo.db:27017)\n"},"mongodbName":{"type":"string","description":"MongoDB name\n"},"mongodbPassword":{"type":"string","description":"MongoDB server password\n"},"mongodbRoles":{"type":"string","description":"MongoDB roles (e.g. MongoDB:[{role:readWrite, db: sales}], MongoDB Atlas:[{roleName : readWrite, databaseName: sales}])\n"},"mongodbServerUri":{"type":"string","description":"MongoDB server URI (e.g. mongodb://user:password@my.mongo.db:27017/admin?replicaSet=mySet)\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"mongodbUsername":{"type":"string","description":"MongoDB server username\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB name\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (e.g. 60s, 60m, 60h)\n"}},"type":"object","required":["dynamicSecretMongodbId","name","secureAccessDbName"],"inputProperties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretMongodbId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbHostPort":{"type":"string","description":"host:port (e.g. my.mongo.db:27017)\n"},"mongodbName":{"type":"string","description":"MongoDB name\n"},"mongodbPassword":{"type":"string","description":"MongoDB server password\n"},"mongodbRoles":{"type":"string","description":"MongoDB roles (e.g. MongoDB:[{role:readWrite, db: sales}], MongoDB Atlas:[{roleName : readWrite, databaseName: sales}])\n"},"mongodbServerUri":{"type":"string","description":"MongoDB server URI (e.g. mongodb://user:password@my.mongo.db:27017/admin?replicaSet=mySet)\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"mongodbUsername":{"type":"string","description":"MongoDB server username\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB name\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (e.g. 60s, 60m, 60h)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretMongodb resources.\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretMongodbId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbHostPort":{"type":"string","description":"host:port (e.g. my.mongo.db:27017)\n"},"mongodbName":{"type":"string","description":"MongoDB name\n"},"mongodbPassword":{"type":"string","description":"MongoDB server password\n"},"mongodbRoles":{"type":"string","description":"MongoDB roles (e.g. MongoDB:[{role:readWrite, db: sales}], MongoDB Atlas:[{roleName : readWrite, databaseName: sales}])\n"},"mongodbServerUri":{"type":"string","description":"MongoDB server URI (e.g. mongodb://user:password@my.mongo.db:27017/admin?replicaSet=mySet)\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"mongodbUsername":{"type":"string","description":"MongoDB server username\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB name\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL (e.g. 60s, 60m, 60h)\n"}},"type":"object"}},"akeyless:index/dynamicSecretMssql:DynamicSecretMssql":{"description":"Microsoft SQL Server dynamic secret resource\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretMssqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mssqlCreateStatements":{"type":"string","description":"MSSQL Server Creation Statements\n"},"mssqlDbname":{"type":"string","description":"MSSQL Server DB Name\n"},"mssqlHost":{"type":"string","description":"MS SQL Server host name\n"},"mssqlPassword":{"type":"string","description":"MS SQL Server password\n"},"mssqlPort":{"type":"string","description":"MS SQL Server port\n"},"mssqlRevocationStatements":{"type":"string","description":"MSSQL Server Revocation Statements\n"},"mssqlUsername":{"type":"string","description":"MS SQL Server user\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretMssqlId","name","secureAccessDbName"],"inputProperties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretMssqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mssqlCreateStatements":{"type":"string","description":"MSSQL Server Creation Statements\n"},"mssqlDbname":{"type":"string","description":"MSSQL Server DB Name\n"},"mssqlHost":{"type":"string","description":"MS SQL Server host name\n"},"mssqlPassword":{"type":"string","description":"MS SQL Server password\n"},"mssqlPort":{"type":"string","description":"MS SQL Server port\n"},"mssqlRevocationStatements":{"type":"string","description":"MSSQL Server Revocation Statements\n"},"mssqlUsername":{"type":"string","description":"MS SQL Server user\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretMssql resources.\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretMssqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mssqlCreateStatements":{"type":"string","description":"MSSQL Server Creation Statements\n"},"mssqlDbname":{"type":"string","description":"MSSQL Server DB Name\n"},"mssqlHost":{"type":"string","description":"MS SQL Server host name\n"},"mssqlPassword":{"type":"string","description":"MS SQL Server password\n"},"mssqlPort":{"type":"string","description":"MS SQL Server port\n"},"mssqlRevocationStatements":{"type":"string","description":"MSSQL Server Revocation Statements\n"},"mssqlUsername":{"type":"string","description":"MS SQL Server user\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretMysql:DynamicSecretMysql":{"description":"MySQL dynamic secret resource\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dynamicSecretMysqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mysqlCreationStatements":{"type":"string","description":"MySQL Creation Statements\n"},"mysqlDbname":{"type":"string","description":"MySQL DB name\n"},"mysqlHost":{"type":"string","description":"MySQL host name\n"},"mysqlPassword":{"type":"string","description":"MySQL password\n","secret":true},"mysqlPort":{"type":"string","description":"MySQL port\n"},"mysqlRevocationStatements":{"type":"string","description":"MySQL Revocation Statements\n"},"mysqlUsername":{"type":"string","description":"MySQL user\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretMysqlId","name","secureAccessDbName"],"inputProperties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dynamicSecretMysqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mysqlCreationStatements":{"type":"string","description":"MySQL Creation Statements\n"},"mysqlDbname":{"type":"string","description":"MySQL DB name\n"},"mysqlHost":{"type":"string","description":"MySQL host name\n"},"mysqlPassword":{"type":"string","description":"MySQL password\n","secret":true},"mysqlPort":{"type":"string","description":"MySQL port\n"},"mysqlRevocationStatements":{"type":"string","description":"MySQL Revocation Statements\n"},"mysqlUsername":{"type":"string","description":"MySQL user\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretMysql resources.\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dynamicSecretMysqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"mysqlCreationStatements":{"type":"string","description":"MySQL Creation Statements\n"},"mysqlDbname":{"type":"string","description":"MySQL DB name\n"},"mysqlHost":{"type":"string","description":"MySQL host name\n"},"mysqlPassword":{"type":"string","description":"MySQL password\n","secret":true},"mysqlPort":{"type":"string","description":"MySQL port\n"},"mysqlRevocationStatements":{"type":"string","description":"MySQL Revocation Statements\n"},"mysqlUsername":{"type":"string","description":"MySQL user\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretOracle:DynamicSecretOracle":{"description":"Oracle DB dynamic secret resource\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dynamicSecretOracleId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"oracleCreationStatements":{"type":"string","description":"Oracle Creation Statements\n"},"oracleHost":{"type":"string","description":"Oracle host name\n"},"oraclePassword":{"type":"string","description":"Oracle password\n"},"oraclePort":{"type":"string","description":"Oracle port\n"},"oracleRevocationStatements":{"type":"string","description":"Oracle Revocation Statements\n"},"oracleServiceName":{"type":"string","description":"Oracle service name\n"},"oracleUsername":{"type":"string","description":"Oracle user\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretOracleId","name"],"inputProperties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dynamicSecretOracleId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"oracleCreationStatements":{"type":"string","description":"Oracle Creation Statements\n"},"oracleHost":{"type":"string","description":"Oracle host name\n"},"oraclePassword":{"type":"string","description":"Oracle password\n"},"oraclePort":{"type":"string","description":"Oracle port\n"},"oracleRevocationStatements":{"type":"string","description":"Oracle Revocation Statements\n"},"oracleServiceName":{"type":"string","description":"Oracle service name\n"},"oracleUsername":{"type":"string","description":"Oracle user\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretOracle resources.\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dynamicSecretOracleId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"oracleCreationStatements":{"type":"string","description":"Oracle Creation Statements\n"},"oracleHost":{"type":"string","description":"Oracle host name\n"},"oraclePassword":{"type":"string","description":"Oracle password\n"},"oraclePort":{"type":"string","description":"Oracle port\n"},"oracleRevocationStatements":{"type":"string","description":"Oracle Revocation Statements\n"},"oracleServiceName":{"type":"string","description":"Oracle service name\n"},"oracleUsername":{"type":"string","description":"Oracle user\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretPostgresql:DynamicSecretPostgresql":{"description":"PostgreSQL dynamic secret resource\n","properties":{"creationStatements":{"type":"string","description":"PostgreSQL Creation Statements\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretPostgresqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"postgresqlDbName":{"type":"string","description":"PostgreSQL DB name\n"},"postgresqlHost":{"type":"string","description":"PostgreSQL host name\n"},"postgresqlPassword":{"type":"string","description":"PostgreSQL password\n"},"postgresqlPort":{"type":"string","description":"PostgreSQL port\n"},"postgresqlUsername":{"type":"string","description":"PostgreSQL user\n"},"revocationStatements":{"type":"string","description":"PostgreSQL Revocation Statement\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretPostgresqlId","name","secureAccessDbName"],"inputProperties":{"creationStatements":{"type":"string","description":"PostgreSQL Creation Statements\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretPostgresqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"postgresqlDbName":{"type":"string","description":"PostgreSQL DB name\n"},"postgresqlHost":{"type":"string","description":"PostgreSQL host name\n"},"postgresqlPassword":{"type":"string","description":"PostgreSQL password\n"},"postgresqlPort":{"type":"string","description":"PostgreSQL port\n"},"postgresqlUsername":{"type":"string","description":"PostgreSQL user\n"},"revocationStatements":{"type":"string","description":"PostgreSQL Revocation Statement\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretPostgresql resources.\n","properties":{"creationStatements":{"type":"string","description":"PostgreSQL Creation Statements\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretPostgresqlId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"postgresqlDbName":{"type":"string","description":"PostgreSQL DB name\n"},"postgresqlHost":{"type":"string","description":"PostgreSQL host name\n"},"postgresqlPassword":{"type":"string","description":"PostgreSQL password\n"},"postgresqlPort":{"type":"string","description":"PostgreSQL port\n"},"postgresqlUsername":{"type":"string","description":"PostgreSQL user\n"},"revocationStatements":{"type":"string","description":"PostgreSQL Revocation Statement\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretRdp:DynamicSecretRdp":{"description":"RDP dynamic secret resource\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretRdpId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"fixedUserOnly":{"type":"string","description":"Enable fixed user only\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rdpAdminName":{"type":"string","description":"RDP Admin name\n"},"rdpAdminPwd":{"type":"string","description":"RDP Admin Password\n"},"rdpHostName":{"type":"string","description":"RDP Host name\n"},"rdpHostPort":{"type":"string","description":"RDP Host port\n"},"rdpUserGroups":{"type":"string","description":"RDP UserGroup name(s). Multiple values should be separated by comma\n"},"secureAccessAllowExternalUser":{"type":"boolean","description":"Allow providing external user for a domain users\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessRdpDomain":{"type":"string","description":"Required when the Dynamic Secret is used for a domain user\n"},"secureAccessRdpUser":{"type":"string","description":"Override the RDP Domain username\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretRdpId","name","secureAccessWeb"],"inputProperties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretRdpId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"fixedUserOnly":{"type":"string","description":"Enable fixed user only\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rdpAdminName":{"type":"string","description":"RDP Admin name\n"},"rdpAdminPwd":{"type":"string","description":"RDP Admin Password\n"},"rdpHostName":{"type":"string","description":"RDP Host name\n"},"rdpHostPort":{"type":"string","description":"RDP Host port\n"},"rdpUserGroups":{"type":"string","description":"RDP UserGroup name(s). Multiple values should be separated by comma\n"},"secureAccessAllowExternalUser":{"type":"boolean","description":"Allow providing external user for a domain users\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessRdpDomain":{"type":"string","description":"Required when the Dynamic Secret is used for a domain user\n"},"secureAccessRdpUser":{"type":"string","description":"Override the RDP Domain username\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretRdp resources.\n","properties":{"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretRdpId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"fixedUserOnly":{"type":"string","description":"Enable fixed user only\n"},"name":{"type":"string","description":"Dynamic secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rdpAdminName":{"type":"string","description":"RDP Admin name\n"},"rdpAdminPwd":{"type":"string","description":"RDP Admin Password\n"},"rdpHostName":{"type":"string","description":"RDP Host name\n"},"rdpHostPort":{"type":"string","description":"RDP Host port\n"},"rdpUserGroups":{"type":"string","description":"RDP UserGroup name(s). Multiple values should be separated by comma\n"},"secureAccessAllowExternalUser":{"type":"boolean","description":"Allow providing external user for a domain users\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessRdpDomain":{"type":"string","description":"Required when the Dynamic Secret is used for a domain user\n"},"secureAccessRdpUser":{"type":"string","description":"Override the RDP Domain username\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/dynamicSecretRedshift:DynamicSecretRedshift":{"description":"Redshift dynamic secret resource\n","properties":{"creationStatements":{"type":"string","description":"Redshift Creation Statements\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"redshiftDbName":{"type":"string","description":"Redshift DB name\n"},"redshiftHost":{"type":"string","description":"Redshift host name\n"},"redshiftPassword":{"type":"string","description":"Redshift password\n"},"redshiftPort":{"type":"string","description":"Redshift port\n"},"redshiftUsername":{"type":"string","description":"redshiftL user\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["dynamicSecretRedshiftId","name","secureAccessDbName","secureAccessWeb"],"inputProperties":{"creationStatements":{"type":"string","description":"Redshift Creation Statements\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"redshiftDbName":{"type":"string","description":"Redshift DB name\n"},"redshiftHost":{"type":"string","description":"Redshift host name\n"},"redshiftPassword":{"type":"string","description":"Redshift password\n"},"redshiftPort":{"type":"string","description":"Redshift port\n"},"redshiftUsername":{"type":"string","description":"redshiftL user\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering DynamicSecretRedshift resources.\n","properties":{"creationStatements":{"type":"string","description":"Redshift Creation Statements\n"},"customUsernameTemplate":{"type":"string","description":"Customize how temporary usernames are generated using go template\n"},"dynamicSecretRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"encryptionKeyName":{"type":"string","description":"Encrypt dynamic secret details with following key\n"},"name":{"type":"string","description":"Dynamic Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"redshiftDbName":{"type":"string","description":"Redshift DB name\n"},"redshiftHost":{"type":"string","description":"Redshift host name\n"},"redshiftPassword":{"type":"string","description":"Redshift password\n"},"redshiftPort":{"type":"string","description":"Redshift port\n"},"redshiftUsername":{"type":"string","description":"redshiftL user\n"},"secureAccessDbName":{"type":"string","description":"The DB Name\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in dynamic secret creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/eventForwarderEmail:EventForwarderEmail":{"description":"Event Forwarder Email resource\n","properties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"description":{"type":"string","description":"Description of the object\n"},"emailTo":{"type":"string","description":"A comma seperated list of email addresses to send event to\n"},"eventForwarderEmailId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"includeError":{"type":"string","description":"Set this option to include event errors details [true/false]\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"overrideUrl":{"type":"string","description":"Override Akeyless default URL with your Gateway url (port 18888)\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"}},"type":"object","required":["eventForwarderEmailId","key","name"],"inputProperties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"description":{"type":"string","description":"Description of the object\n"},"emailTo":{"type":"string","description":"A comma seperated list of email addresses to send event to\n"},"eventForwarderEmailId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"includeError":{"type":"string","description":"Set this option to include event errors details [true/false]\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"overrideUrl":{"type":"string","description":"Override Akeyless default URL with your Gateway url (port 18888)\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering EventForwarderEmail resources.\n","properties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"description":{"type":"string","description":"Description of the object\n"},"emailTo":{"type":"string","description":"A comma seperated list of email addresses to send event to\n"},"eventForwarderEmailId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"includeError":{"type":"string","description":"Set this option to include event errors details [true/false]\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"overrideUrl":{"type":"string","description":"Override Akeyless default URL with your Gateway url (port 18888)\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"}},"type":"object"}},"akeyless:index/eventForwarderServiceNow:EventForwarderServiceNow":{"description":"Event Forwarder Service Now resource\n","properties":{"adminName":{"type":"string","description":"Workstation Admin Name\n"},"adminPwd":{"type":"string","description":"Workstation Admin Password\n","secret":true},"appPrivateKeyBase64":{"type":"string","description":"The RSA Private Key to use when connecting with jwt authentication\n","secret":true},"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"authType":{"type":"string","description":"The authentication type to use [user-pass/jwt]\n"},"clientId":{"type":"string","description":"The client ID to use when connecting with jwt authentication\n"},"clientSecret":{"type":"string","description":"The client secret to use when connecting with jwt authentication\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderServiceNowId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"host":{"type":"string","description":"Workstation Host\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"userEmail":{"type":"string","description":"The user email to identify with when connecting with jwt authentication\n"}},"type":"object","required":["eventForwarderServiceNowId","key","name"],"inputProperties":{"adminName":{"type":"string","description":"Workstation Admin Name\n"},"adminPwd":{"type":"string","description":"Workstation Admin Password\n","secret":true},"appPrivateKeyBase64":{"type":"string","description":"The RSA Private Key to use when connecting with jwt authentication\n","secret":true},"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"authType":{"type":"string","description":"The authentication type to use [user-pass/jwt]\n"},"clientId":{"type":"string","description":"The client ID to use when connecting with jwt authentication\n"},"clientSecret":{"type":"string","description":"The client secret to use when connecting with jwt authentication\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderServiceNowId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"host":{"type":"string","description":"Workstation Host\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"userEmail":{"type":"string","description":"The user email to identify with when connecting with jwt authentication\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering EventForwarderServiceNow resources.\n","properties":{"adminName":{"type":"string","description":"Workstation Admin Name\n"},"adminPwd":{"type":"string","description":"Workstation Admin Password\n","secret":true},"appPrivateKeyBase64":{"type":"string","description":"The RSA Private Key to use when connecting with jwt authentication\n","secret":true},"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"authType":{"type":"string","description":"The authentication type to use [user-pass/jwt]\n"},"clientId":{"type":"string","description":"The client ID to use when connecting with jwt authentication\n"},"clientSecret":{"type":"string","description":"The client secret to use when connecting with jwt authentication\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderServiceNowId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"host":{"type":"string","description":"Workstation Host\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"userEmail":{"type":"string","description":"The user email to identify with when connecting with jwt authentication\n"}},"type":"object"}},"akeyless:index/eventForwarderSlack:EventForwarderSlack":{"description":"Event Forwarder Slack resource\n","properties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderSlackId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"url":{"type":"string","description":"Slack Webhook URL\n","secret":true}},"type":"object","required":["eventForwarderSlackId","key","name","url"],"inputProperties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderSlackId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"url":{"type":"string","description":"Slack Webhook URL\n","secret":true}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering EventForwarderSlack resources.\n","properties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderSlackId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"url":{"type":"string","description":"Slack Webhook URL\n","secret":true}},"type":"object"}},"akeyless:index/eventForwarderWebhook:EventForwarderWebhook":{"description":"Event Forwarder Webhook resource\n","properties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"authToken":{"type":"string","description":"Base64 encoded Token string relevant for token auth-type\n","secret":true},"authType":{"type":"string","description":"The Webhook authentication type [user-pass, bearer-token, certificate]\n"},"clientCertData":{"type":"string","description":"Base64 encoded PEM certificate, relevant for certificate auth-type\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderWebhookId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"password":{"type":"string","description":"Password for authentication relevant for user-pass auth-type\n","secret":true},"privateKeyData":{"type":"string","description":"Base64 encoded PEM RSA Private Key, relevant for certificate auth-type\n","secret":true},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"serverCertificates":{"type":"string","description":"Base64 encoded PEM certificate of the Webhook\n","secret":true},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"url":{"type":"string","description":"Webhook URL\n"},"username":{"type":"string","description":"Username for authentication relevant for user-pass auth-type\n"}},"type":"object","required":["eventForwarderWebhookId","key","name"],"inputProperties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"authToken":{"type":"string","description":"Base64 encoded Token string relevant for token auth-type\n","secret":true},"authType":{"type":"string","description":"The Webhook authentication type [user-pass, bearer-token, certificate]\n"},"clientCertData":{"type":"string","description":"Base64 encoded PEM certificate, relevant for certificate auth-type\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderWebhookId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"password":{"type":"string","description":"Password for authentication relevant for user-pass auth-type\n","secret":true},"privateKeyData":{"type":"string","description":"Base64 encoded PEM RSA Private Key, relevant for certificate auth-type\n","secret":true},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"serverCertificates":{"type":"string","description":"Base64 encoded PEM certificate of the Webhook\n","secret":true},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"url":{"type":"string","description":"Webhook URL\n"},"username":{"type":"string","description":"Username for authentication relevant for user-pass auth-type\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering EventForwarderWebhook resources.\n","properties":{"authMethodsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Auth Methods event sources to forward events about, for example: /abc/*\n"},"authToken":{"type":"string","description":"Base64 encoded Token string relevant for token auth-type\n","secret":true},"authType":{"type":"string","description":"The Webhook authentication type [user-pass, bearer-token, certificate]\n"},"clientCertData":{"type":"string","description":"Base64 encoded PEM certificate, relevant for certificate auth-type\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"eventForwarderWebhookId":{"type":"string","description":"The ID of this resource.\n"},"eventTypes":{"type":"array","items":{"type":"string"},"description":"A comma-separated list of types of events to notify about\n"},"every":{"type":"string","description":"Rate of periodic runner repetition in hours\n"},"gatewaysEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Gateways event sources to forward events about,for example the relevant Gateways cluster urls,: http://localhost:8000.\n"},"itemsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Items event sources to forward events about, for example: /abc/*\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the Event Forwarder secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Event Forwarder name\n"},"password":{"type":"string","description":"Password for authentication relevant for user-pass auth-type\n","secret":true},"privateKeyData":{"type":"string","description":"Base64 encoded PEM RSA Private Key, relevant for certificate auth-type\n","secret":true},"runnerType":{"type":"string","description":"Event Forwarder runner type [immediate/periodic]\n"},"serverCertificates":{"type":"string","description":"Base64 encoded PEM certificate of the Webhook\n","secret":true},"targetsEventSourceLocations":{"type":"array","items":{"type":"string"},"description":"Targets event sources to forward events about, for example: /abc/*\n"},"url":{"type":"string","description":"Webhook URL\n"},"username":{"type":"string","description":"Username for authentication relevant for user-pass auth-type\n"}},"type":"object"}},"akeyless:index/folder:Folder":{"description":"Folder Resource\n","properties":{"akeylessFolderId":{"type":"string","description":"The ID of this resource.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this folder [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"folderId":{"type":"number","description":"The ID of the folder\n"},"name":{"type":"string","description":"The name to the folder\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of tags attached to this folder\n"}},"type":"object","required":["akeylessFolderId","deleteProtection","folderId","name"],"inputProperties":{"akeylessFolderId":{"type":"string","description":"The ID of this resource.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this folder [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"name":{"type":"string","description":"The name to the folder\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of tags attached to this folder\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering Folder resources.\n","properties":{"akeylessFolderId":{"type":"string","description":"The ID of this resource.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this folder [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"folderId":{"type":"number","description":"The ID of the folder\n"},"name":{"type":"string","description":"The name to the folder\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of tags attached to this folder\n"}},"type":"object"}},"akeyless:index/gatewayAllowedAccess:GatewayAllowedAccess":{"description":"Create gateway allowed access\n","properties":{"accessId":{"type":"string","description":"The access id to be attached to this allowed access\n"},"description":{"type":"string","description":"Allowed access description\n"},"gatewayAllowedAccessId":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Allowed access name\n"},"permissions":{"type":"string","description":"Comma-seperated list of permissions for this allowed access. Available permissions: [defaults,targets,classic*keys,automatic*migration,ldap*auth,dynamic*secret,k8s*auth,log*forwarding,zero*knowledge*encryption,rotated*secret,caching,event*forwarding,admin,kmip,general]\n"},"subClaims":{"type":"object","additionalProperties":{"type":"string"},"description":"key/val of sub claims, e.g group=admins,developers\n"}},"type":"object","required":["accessId","gatewayAllowedAccessId","name"],"inputProperties":{"accessId":{"type":"string","description":"The access id to be attached to this allowed access\n"},"description":{"type":"string","description":"Allowed access description\n"},"gatewayAllowedAccessId":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Allowed access name\n"},"permissions":{"type":"string","description":"Comma-seperated list of permissions for this allowed access. Available permissions: [defaults,targets,classic*keys,automatic*migration,ldap*auth,dynamic*secret,k8s*auth,log*forwarding,zero*knowledge*encryption,rotated*secret,caching,event*forwarding,admin,kmip,general]\n"},"subClaims":{"type":"object","additionalProperties":{"type":"string"},"description":"key/val of sub claims, e.g group=admins,developers\n"}},"requiredInputs":["accessId"],"stateInputs":{"description":"Input properties used for looking up and filtering GatewayAllowedAccess resources.\n","properties":{"accessId":{"type":"string","description":"The access id to be attached to this allowed access\n"},"description":{"type":"string","description":"Allowed access description\n"},"gatewayAllowedAccessId":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Allowed access name\n"},"permissions":{"type":"string","description":"Comma-seperated list of permissions for this allowed access. Available permissions: [defaults,targets,classic*keys,automatic*migration,ldap*auth,dynamic*secret,k8s*auth,log*forwarding,zero*knowledge*encryption,rotated*secret,caching,event*forwarding,admin,kmip,general]\n"},"subClaims":{"type":"object","additionalProperties":{"type":"string"},"description":"key/val of sub claims, e.g group=admins,developers\n"}},"type":"object"}},"akeyless:index/gatewayCache:GatewayCache":{"description":"Cache settings\n","properties":{"backupInterval":{"type":"string","description":"Secure backup interval in minutes. To ensure service continuity in case of power cycle and network outage secrets will be backed up periodically per backup interval\n"},"enableCache":{"type":"string","description":"Enable cache [true/false]\n"},"enableProactive":{"type":"string","description":"Enable proactive caching [true/false]\n"},"gatewayCacheId":{"type":"string","description":"The ID of this resource.\n"},"minimumFetchInterval":{"type":"string","description":"When using Cache or/and Proactive Cache, additional secrets will be fetched upon requesting a secret, based on the requestor's access policy. Define minimum fetching interval to avoid over fetching in a given time frame\n"},"staleTimeout":{"type":"string","description":"Stale timeout in minutes, cache entries which are not accessed within timeout will be removed from cache\n"}},"type":"object","required":["gatewayCacheId"],"inputProperties":{"backupInterval":{"type":"string","description":"Secure backup interval in minutes. To ensure service continuity in case of power cycle and network outage secrets will be backed up periodically per backup interval\n"},"enableCache":{"type":"string","description":"Enable cache [true/false]\n"},"enableProactive":{"type":"string","description":"Enable proactive caching [true/false]\n"},"gatewayCacheId":{"type":"string","description":"The ID of this resource.\n"},"minimumFetchInterval":{"type":"string","description":"When using Cache or/and Proactive Cache, additional secrets will be fetched upon requesting a secret, based on the requestor's access policy. Define minimum fetching interval to avoid over fetching in a given time frame\n"},"staleTimeout":{"type":"string","description":"Stale timeout in minutes, cache entries which are not accessed within timeout will be removed from cache\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayCache resources.\n","properties":{"backupInterval":{"type":"string","description":"Secure backup interval in minutes. To ensure service continuity in case of power cycle and network outage secrets will be backed up periodically per backup interval\n"},"enableCache":{"type":"string","description":"Enable cache [true/false]\n"},"enableProactive":{"type":"string","description":"Enable proactive caching [true/false]\n"},"gatewayCacheId":{"type":"string","description":"The ID of this resource.\n"},"minimumFetchInterval":{"type":"string","description":"When using Cache or/and Proactive Cache, additional secrets will be fetched upon requesting a secret, based on the requestor's access policy. Define minimum fetching interval to avoid over fetching in a given time frame\n"},"staleTimeout":{"type":"string","description":"Stale timeout in minutes, cache entries which are not accessed within timeout will be removed from cache\n"}},"type":"object"}},"akeyless:index/gatewayDefaults:GatewayDefaults":{"description":"Defaults settings\n","properties":{"certAccessId":{"type":"string","description":"Default Certificate access-id for UI login\n"},"eventOnStatusChange":{"type":"string","description":"Trigger an event when Gateway status is changed [true/false]\n"},"gatewayDefaultsId":{"type":"string","description":"The ID of this resource.\n"},"key":{"type":"string","description":"The name of the gateway default encryption key\n"},"oidcAccessId":{"type":"string","description":"Default OIDC access-id for UI login\n"},"samlAccessId":{"type":"string","description":"Default SAML access-id for UI login\n"}},"type":"object","required":["gatewayDefaultsId"],"inputProperties":{"certAccessId":{"type":"string","description":"Default Certificate access-id for UI login\n"},"eventOnStatusChange":{"type":"string","description":"Trigger an event when Gateway status is changed [true/false]\n"},"gatewayDefaultsId":{"type":"string","description":"The ID of this resource.\n"},"key":{"type":"string","description":"The name of the gateway default encryption key\n"},"oidcAccessId":{"type":"string","description":"Default OIDC access-id for UI login\n"},"samlAccessId":{"type":"string","description":"Default SAML access-id for UI login\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayDefaults resources.\n","properties":{"certAccessId":{"type":"string","description":"Default Certificate access-id for UI login\n"},"eventOnStatusChange":{"type":"string","description":"Trigger an event when Gateway status is changed [true/false]\n"},"gatewayDefaultsId":{"type":"string","description":"The ID of this resource.\n"},"key":{"type":"string","description":"The name of the gateway default encryption key\n"},"oidcAccessId":{"type":"string","description":"Default OIDC access-id for UI login\n"},"samlAccessId":{"type":"string","description":"Default SAML access-id for UI login\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingAwsS3:GatewayLogForwardingAwsS3":{"description":"Log Forwarding config for aws-s3\n","properties":{"accessId":{"type":"string","description":"AWS access id relevant for\u003cspan pulumi-lang-nodejs=\" accessKey \" pulumi-lang-dotnet=\" AccessKey \" pulumi-lang-go=\" accessKey \" pulumi-lang-python=\" access_key \" pulumi-lang-yaml=\" accessKey \" pulumi-lang-java=\" accessKey \"\u003e access_key \u003c/span\u003eauth-type\n"},"accessKey":{"type":"string","description":"AWS access key relevant for\u003cspan pulumi-lang-nodejs=\" accessKey \" pulumi-lang-dotnet=\" AccessKey \" pulumi-lang-go=\" accessKey \" pulumi-lang-python=\" access_key \" pulumi-lang-yaml=\" accessKey \" pulumi-lang-java=\" accessKey \"\u003e access_key \u003c/span\u003eauth-type\n","secret":true},"authType":{"type":"string","description":"AWS auth type [access*key/cloud*id/assume_role]\n"},"bucketName":{"type":"string","description":"AWS S3 bucket name\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingAwsS3Id":{"type":"string","description":"The ID of this resource.\n"},"logFolder":{"type":"string","description":"AWS S3 destination folder for logs\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"region":{"type":"string","description":"AWS region\n"},"roleArn":{"type":"string","description":"AWS role arn relevant for\u003cspan pulumi-lang-nodejs=\" assumeRole \" pulumi-lang-dotnet=\" AssumeRole \" pulumi-lang-go=\" assumeRole \" pulumi-lang-python=\" assume_role \" pulumi-lang-yaml=\" assumeRole \" pulumi-lang-java=\" assumeRole \"\u003e assume_role \u003c/span\u003eauth-type\n"}},"type":"object","required":["gatewayLogForwardingAwsS3Id"],"inputProperties":{"accessId":{"type":"string","description":"AWS access id relevant for\u003cspan pulumi-lang-nodejs=\" accessKey \" pulumi-lang-dotnet=\" AccessKey \" pulumi-lang-go=\" accessKey \" pulumi-lang-python=\" access_key \" pulumi-lang-yaml=\" accessKey \" pulumi-lang-java=\" accessKey \"\u003e access_key \u003c/span\u003eauth-type\n"},"accessKey":{"type":"string","description":"AWS access key relevant for\u003cspan pulumi-lang-nodejs=\" accessKey \" pulumi-lang-dotnet=\" AccessKey \" pulumi-lang-go=\" accessKey \" pulumi-lang-python=\" access_key \" pulumi-lang-yaml=\" accessKey \" pulumi-lang-java=\" accessKey \"\u003e access_key \u003c/span\u003eauth-type\n","secret":true},"authType":{"type":"string","description":"AWS auth type [access*key/cloud*id/assume_role]\n"},"bucketName":{"type":"string","description":"AWS S3 bucket name\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingAwsS3Id":{"type":"string","description":"The ID of this resource.\n"},"logFolder":{"type":"string","description":"AWS S3 destination folder for logs\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"region":{"type":"string","description":"AWS region\n"},"roleArn":{"type":"string","description":"AWS role arn relevant for\u003cspan pulumi-lang-nodejs=\" assumeRole \" pulumi-lang-dotnet=\" AssumeRole \" pulumi-lang-go=\" assumeRole \" pulumi-lang-python=\" assume_role \" pulumi-lang-yaml=\" assumeRole \" pulumi-lang-java=\" assumeRole \"\u003e assume_role \u003c/span\u003eauth-type\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingAwsS3 resources.\n","properties":{"accessId":{"type":"string","description":"AWS access id relevant for\u003cspan pulumi-lang-nodejs=\" accessKey \" pulumi-lang-dotnet=\" AccessKey \" pulumi-lang-go=\" accessKey \" pulumi-lang-python=\" access_key \" pulumi-lang-yaml=\" accessKey \" pulumi-lang-java=\" accessKey \"\u003e access_key \u003c/span\u003eauth-type\n"},"accessKey":{"type":"string","description":"AWS access key relevant for\u003cspan pulumi-lang-nodejs=\" accessKey \" pulumi-lang-dotnet=\" AccessKey \" pulumi-lang-go=\" accessKey \" pulumi-lang-python=\" access_key \" pulumi-lang-yaml=\" accessKey \" pulumi-lang-java=\" accessKey \"\u003e access_key \u003c/span\u003eauth-type\n","secret":true},"authType":{"type":"string","description":"AWS auth type [access*key/cloud*id/assume_role]\n"},"bucketName":{"type":"string","description":"AWS S3 bucket name\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingAwsS3Id":{"type":"string","description":"The ID of this resource.\n"},"logFolder":{"type":"string","description":"AWS S3 destination folder for logs\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"region":{"type":"string","description":"AWS region\n"},"roleArn":{"type":"string","description":"AWS role arn relevant for\u003cspan pulumi-lang-nodejs=\" assumeRole \" pulumi-lang-dotnet=\" AssumeRole \" pulumi-lang-go=\" assumeRole \" pulumi-lang-python=\" assume_role \" pulumi-lang-yaml=\" assumeRole \" pulumi-lang-java=\" assumeRole \"\u003e assume_role \u003c/span\u003eauth-type\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingAzureAnalytics:GatewayLogForwardingAzureAnalytics":{"description":"Log Forwarding config for azure-analytics\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingAzureAnalyticsId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"workspaceId":{"type":"string","description":"Azure workspace id\n"},"workspaceKey":{"type":"string","description":"Azure workspace key\n","secret":true}},"type":"object","required":["gatewayLogForwardingAzureAnalyticsId"],"inputProperties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingAzureAnalyticsId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"workspaceId":{"type":"string","description":"Azure workspace id\n"},"workspaceKey":{"type":"string","description":"Azure workspace key\n","secret":true}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingAzureAnalytics resources.\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingAzureAnalyticsId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"workspaceId":{"type":"string","description":"Azure workspace id\n"},"workspaceKey":{"type":"string","description":"Azure workspace key\n","secret":true}},"type":"object"}},"akeyless:index/gatewayLogForwardingDatadog:GatewayLogForwardingDatadog":{"description":"Log Forwarding config for datadog\n","properties":{"apiKey":{"type":"string","description":"Datadog api key\n","secret":true},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingDatadogId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Datadog host\n"},"logService":{"type":"string","description":"Datadog log service\n"},"logSource":{"type":"string","description":"Datadog log source\n"},"logTags":{"type":"string","description":"A comma-separated list of Datadog log tags formatted as key:value strings\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"type":"object","required":["gatewayLogForwardingDatadogId"],"inputProperties":{"apiKey":{"type":"string","description":"Datadog api key\n","secret":true},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingDatadogId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Datadog host\n"},"logService":{"type":"string","description":"Datadog log service\n"},"logSource":{"type":"string","description":"Datadog log source\n"},"logTags":{"type":"string","description":"A comma-separated list of Datadog log tags formatted as key:value strings\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingDatadog resources.\n","properties":{"apiKey":{"type":"string","description":"Datadog api key\n","secret":true},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingDatadogId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Datadog host\n"},"logService":{"type":"string","description":"Datadog log service\n"},"logSource":{"type":"string","description":"Datadog log source\n"},"logTags":{"type":"string","description":"A comma-separated list of Datadog log tags formatted as key:value strings\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingElasticsearch:GatewayLogForwardingElasticsearch":{"description":"Log Forwarding config for elasticsearch\n","properties":{"apiKey":{"type":"string","description":"Elasticsearch api key relevant only for\u003cspan pulumi-lang-nodejs=\" apiKey \" pulumi-lang-dotnet=\" ApiKey \" pulumi-lang-go=\" apiKey \" pulumi-lang-python=\" api_key \" pulumi-lang-yaml=\" apiKey \" pulumi-lang-java=\" apiKey \"\u003e api_key \u003c/span\u003eauth-type\n","secret":true},"authType":{"type":"string","description":"Elasticsearch auth type [api_key/password]\n"},"cloudId":{"type":"string","description":"Elasticsearch cloud id relevant only for cloud server-type\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingElasticsearchId":{"type":"string","description":"The ID of this resource.\n"},"index":{"type":"string","description":"Elasticsearch index\n"},"nodes":{"type":"string","description":"Elasticsearch nodes relevant only for nodes server-type\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"password":{"type":"string","description":"Elasticsearch password relevant only for password auth-type\n","secret":true},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"serverType":{"type":"string","description":"Elasticsearch server type [nodes/cloud]\n"},"tlsCertificate":{"type":"string","description":"Elasticsearch tls certificate (PEM format) in a Base64 format\n","secret":true},"userName":{"type":"string","description":"Elasticsearch user name relevant only for password auth-type\n"}},"type":"object","required":["gatewayLogForwardingElasticsearchId"],"inputProperties":{"apiKey":{"type":"string","description":"Elasticsearch api key relevant only for\u003cspan pulumi-lang-nodejs=\" apiKey \" pulumi-lang-dotnet=\" ApiKey \" pulumi-lang-go=\" apiKey \" pulumi-lang-python=\" api_key \" pulumi-lang-yaml=\" apiKey \" pulumi-lang-java=\" apiKey \"\u003e api_key \u003c/span\u003eauth-type\n","secret":true},"authType":{"type":"string","description":"Elasticsearch auth type [api_key/password]\n"},"cloudId":{"type":"string","description":"Elasticsearch cloud id relevant only for cloud server-type\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingElasticsearchId":{"type":"string","description":"The ID of this resource.\n"},"index":{"type":"string","description":"Elasticsearch index\n"},"nodes":{"type":"string","description":"Elasticsearch nodes relevant only for nodes server-type\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"password":{"type":"string","description":"Elasticsearch password relevant only for password auth-type\n","secret":true},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"serverType":{"type":"string","description":"Elasticsearch server type [nodes/cloud]\n"},"tlsCertificate":{"type":"string","description":"Elasticsearch tls certificate (PEM format) in a Base64 format\n","secret":true},"userName":{"type":"string","description":"Elasticsearch user name relevant only for password auth-type\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingElasticsearch resources.\n","properties":{"apiKey":{"type":"string","description":"Elasticsearch api key relevant only for\u003cspan pulumi-lang-nodejs=\" apiKey \" pulumi-lang-dotnet=\" ApiKey \" pulumi-lang-go=\" apiKey \" pulumi-lang-python=\" api_key \" pulumi-lang-yaml=\" apiKey \" pulumi-lang-java=\" apiKey \"\u003e api_key \u003c/span\u003eauth-type\n","secret":true},"authType":{"type":"string","description":"Elasticsearch auth type [api_key/password]\n"},"cloudId":{"type":"string","description":"Elasticsearch cloud id relevant only for cloud server-type\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingElasticsearchId":{"type":"string","description":"The ID of this resource.\n"},"index":{"type":"string","description":"Elasticsearch index\n"},"nodes":{"type":"string","description":"Elasticsearch nodes relevant only for nodes server-type\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"password":{"type":"string","description":"Elasticsearch password relevant only for password auth-type\n","secret":true},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"serverType":{"type":"string","description":"Elasticsearch server type [nodes/cloud]\n"},"tlsCertificate":{"type":"string","description":"Elasticsearch tls certificate (PEM format) in a Base64 format\n","secret":true},"userName":{"type":"string","description":"Elasticsearch user name relevant only for password auth-type\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingGoogleChronicle:GatewayLogForwardingGoogleChronicle":{"description":"Log Forwarding config for google-chronicle\n","properties":{"customerId":{"type":"string","description":"Google chronicle customer id\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingGoogleChronicleId":{"type":"string","description":"The ID of this resource.\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n","secret":true},"logType":{"type":"string","description":"Google chronicle log type\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"region":{"type":"string","description":"Google chronicle region [eu*multi*region/london/us*multi*region/singapore/tel_aviv]\n"}},"type":"object","required":["gatewayLogForwardingGoogleChronicleId"],"inputProperties":{"customerId":{"type":"string","description":"Google chronicle customer id\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingGoogleChronicleId":{"type":"string","description":"The ID of this resource.\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n","secret":true},"logType":{"type":"string","description":"Google chronicle log type\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"region":{"type":"string","description":"Google chronicle region [eu*multi*region/london/us*multi*region/singapore/tel_aviv]\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingGoogleChronicle resources.\n","properties":{"customerId":{"type":"string","description":"Google chronicle customer id\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingGoogleChronicleId":{"type":"string","description":"The ID of this resource.\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n","secret":true},"logType":{"type":"string","description":"Google chronicle log type\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"region":{"type":"string","description":"Google chronicle region [eu*multi*region/london/us*multi*region/singapore/tel_aviv]\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingLogstash:GatewayLogForwardingLogstash":{"description":"Log Forwarding config for logstash\n","properties":{"dns":{"type":"string","description":"Logstash dns\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingLogstashId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"protocol":{"type":"string","description":"Logstash protocol [tcp/udp]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"tlsCertificate":{"type":"string","description":"Logstash tls certificate (PEM format) in a Base64 format\n","secret":true}},"type":"object","required":["gatewayLogForwardingLogstashId"],"inputProperties":{"dns":{"type":"string","description":"Logstash dns\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingLogstashId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"protocol":{"type":"string","description":"Logstash protocol [tcp/udp]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"tlsCertificate":{"type":"string","description":"Logstash tls certificate (PEM format) in a Base64 format\n","secret":true}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingLogstash resources.\n","properties":{"dns":{"type":"string","description":"Logstash dns\n"},"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingLogstashId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"protocol":{"type":"string","description":"Logstash protocol [tcp/udp]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"tlsCertificate":{"type":"string","description":"Logstash tls certificate (PEM format) in a Base64 format\n","secret":true}},"type":"object"}},"akeyless:index/gatewayLogForwardingLogzIo:GatewayLogForwardingLogzIo":{"description":"Log Forwarding config for logz-io\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingLogzIoId":{"type":"string","description":"The ID of this resource.\n"},"logzIoToken":{"type":"string","description":"Logz-io token\n","secret":true},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"protocol":{"type":"string","description":"Logz-io protocol [tcp/https]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"type":"object","required":["gatewayLogForwardingLogzIoId"],"inputProperties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingLogzIoId":{"type":"string","description":"The ID of this resource.\n"},"logzIoToken":{"type":"string","description":"Logz-io token\n","secret":true},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"protocol":{"type":"string","description":"Logz-io protocol [tcp/https]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingLogzIo resources.\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingLogzIoId":{"type":"string","description":"The ID of this resource.\n"},"logzIoToken":{"type":"string","description":"Logz-io token\n","secret":true},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"protocol":{"type":"string","description":"Logz-io protocol [tcp/https]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingSplunk:GatewayLogForwardingSplunk":{"description":"Log Forwarding config for splunk\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingSplunkId":{"type":"string","description":"The ID of this resource.\n"},"index":{"type":"string","description":"Splunk index\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"source":{"type":"string","description":"Splunk source\n"},"sourceType":{"type":"string","description":"Splunk source type\n"},"splunkToken":{"type":"string","description":"Splunk token\n","secret":true},"splunkUrl":{"type":"string","description":"Splunk server URL\n"},"tlsCertificate":{"type":"string","description":"Splunk tls certificate (PEM format) in a Base64 format\n","secret":true}},"type":"object","required":["gatewayLogForwardingSplunkId"],"inputProperties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingSplunkId":{"type":"string","description":"The ID of this resource.\n"},"index":{"type":"string","description":"Splunk index\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"source":{"type":"string","description":"Splunk source\n"},"sourceType":{"type":"string","description":"Splunk source type\n"},"splunkToken":{"type":"string","description":"Splunk token\n","secret":true},"splunkUrl":{"type":"string","description":"Splunk server URL\n"},"tlsCertificate":{"type":"string","description":"Splunk tls certificate (PEM format) in a Base64 format\n","secret":true}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingSplunk resources.\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls\n"},"gatewayLogForwardingSplunkId":{"type":"string","description":"The ID of this resource.\n"},"index":{"type":"string","description":"Splunk index\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"source":{"type":"string","description":"Splunk source\n"},"sourceType":{"type":"string","description":"Splunk source type\n"},"splunkToken":{"type":"string","description":"Splunk token\n","secret":true},"splunkUrl":{"type":"string","description":"Splunk server URL\n"},"tlsCertificate":{"type":"string","description":"Splunk tls certificate (PEM format) in a Base64 format\n","secret":true}},"type":"object"}},"akeyless:index/gatewayLogForwardingStdout:GatewayLogForwardingStdout":{"description":"Log Forwarding config for standard output\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingStdoutId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"type":"object","required":["gatewayLogForwardingStdoutId"],"inputProperties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingStdoutId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingStdout resources.\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"gatewayLogForwardingStdoutId":{"type":"string","description":"The ID of this resource.\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingSumologic:GatewayLogForwardingSumologic":{"description":"Log Forwarding config for sumologic\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"endpoint":{"type":"string","description":"Sumologic endpoint URL\n","secret":true},"gatewayLogForwardingSumologicId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Sumologic host\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"sumologicTags":{"type":"string","description":"A comma-separated list of Sumologic tags\n"}},"type":"object","required":["gatewayLogForwardingSumologicId"],"inputProperties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"endpoint":{"type":"string","description":"Sumologic endpoint URL\n","secret":true},"gatewayLogForwardingSumologicId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Sumologic host\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"sumologicTags":{"type":"string","description":"A comma-separated list of Sumologic tags\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingSumologic resources.\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"endpoint":{"type":"string","description":"Sumologic endpoint URL\n","secret":true},"gatewayLogForwardingSumologicId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Sumologic host\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"sumologicTags":{"type":"string","description":"A comma-separated list of Sumologic tags\n"}},"type":"object"}},"akeyless:index/gatewayLogForwardingSyslog:GatewayLogForwardingSyslog":{"description":"Log Forwarding config for syslog\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls relevant only for network type TCP\n"},"formatter":{"type":"string","description":"Syslog formatter [text/cef]\n"},"gatewayLogForwardingSyslogId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Syslog host\n"},"network":{"type":"string","description":"Syslog network [tcp/udp]\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"targetTag":{"type":"string","description":"Syslog target tag\n"},"tlsCertificate":{"type":"string","description":"Syslog tls certificate (PEM format) in a Base64 format\n","secret":true}},"type":"object","required":["gatewayLogForwardingSyslogId"],"inputProperties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls relevant only for network type TCP\n"},"formatter":{"type":"string","description":"Syslog formatter [text/cef]\n"},"gatewayLogForwardingSyslogId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Syslog host\n"},"network":{"type":"string","description":"Syslog network [tcp/udp]\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"targetTag":{"type":"string","description":"Syslog target tag\n"},"tlsCertificate":{"type":"string","description":"Syslog tls certificate (PEM format) in a Base64 format\n","secret":true}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayLogForwardingSyslog resources.\n","properties":{"enable":{"type":"string","description":"Enable Log Forwarding [true/false]\n"},"enableTls":{"type":"boolean","description":"Enable tls relevant only for network type TCP\n"},"formatter":{"type":"string","description":"Syslog formatter [text/cef]\n"},"gatewayLogForwardingSyslogId":{"type":"string","description":"The ID of this resource.\n"},"host":{"type":"string","description":"Syslog host\n"},"network":{"type":"string","description":"Syslog network [tcp/udp]\n"},"outputFormat":{"type":"string","description":"Logs format [text/json]\n"},"pullInterval":{"type":"string","description":"Pull interval in seconds\n"},"targetTag":{"type":"string","description":"Syslog target tag\n"},"tlsCertificate":{"type":"string","description":"Syslog tls certificate (PEM format) in a Base64 format\n","secret":true}},"type":"object"}},"akeyless:index/gatewayRemoteAccess:GatewayRemoteAccess":{"description":"Remote access config\n","properties":{"allowedUrls":{"type":"string","description":"List of valid URLs to redirect from the Portal back to the remote access server (in a comma-delimited list)\n"},"gatewayRemoteAccessId":{"type":"string","description":"The ID of this resource.\n"},"hideSessionRecording":{"type":"string","description":"Specifies whether to show/hide if the session is currently recorded [true/false]\n"},"kexalgs":{"type":"string","description":"Decide which algorithm will be used as part of the SSH initial hand-shake process\n"},"keyboardLayout":{"type":"string","description":"Enable support for additional keyboard layouts\n"},"legacySshAlgorithm":{"type":"string","description":"Signs SSH certificates using legacy ssh-rsa-cert-01@openssh.com signing algorithm [true/false]\n"},"rdpTargetConfiguration":{"type":"string","description":"Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email\n"},"sshTargetConfiguration":{"type":"string","description":"Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email\n"}},"type":"object","required":["gatewayRemoteAccessId"],"inputProperties":{"allowedUrls":{"type":"string","description":"List of valid URLs to redirect from the Portal back to the remote access server (in a comma-delimited list)\n"},"gatewayRemoteAccessId":{"type":"string","description":"The ID of this resource.\n"},"hideSessionRecording":{"type":"string","description":"Specifies whether to show/hide if the session is currently recorded [true/false]\n"},"kexalgs":{"type":"string","description":"Decide which algorithm will be used as part of the SSH initial hand-shake process\n"},"keyboardLayout":{"type":"string","description":"Enable support for additional keyboard layouts\n"},"legacySshAlgorithm":{"type":"string","description":"Signs SSH certificates using legacy ssh-rsa-cert-01@openssh.com signing algorithm [true/false]\n"},"rdpTargetConfiguration":{"type":"string","description":"Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email\n"},"sshTargetConfiguration":{"type":"string","description":"Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayRemoteAccess resources.\n","properties":{"allowedUrls":{"type":"string","description":"List of valid URLs to redirect from the Portal back to the remote access server (in a comma-delimited list)\n"},"gatewayRemoteAccessId":{"type":"string","description":"The ID of this resource.\n"},"hideSessionRecording":{"type":"string","description":"Specifies whether to show/hide if the session is currently recorded [true/false]\n"},"kexalgs":{"type":"string","description":"Decide which algorithm will be used as part of the SSH initial hand-shake process\n"},"keyboardLayout":{"type":"string","description":"Enable support for additional keyboard layouts\n"},"legacySshAlgorithm":{"type":"string","description":"Signs SSH certificates using legacy ssh-rsa-cert-01@openssh.com signing algorithm [true/false]\n"},"rdpTargetConfiguration":{"type":"string","description":"Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email\n"},"sshTargetConfiguration":{"type":"string","description":"Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email\n"}},"type":"object"}},"akeyless:index/gatewayRemoteAccessRdpRecording:GatewayRemoteAccessRdpRecording":{"description":"Remote access rdp recording config\n","properties":{"awsStorageAccessKeyId":{"type":"string","description":"AWS access key id. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id*credentials*access-keys.html\n"},"awsStorageBucketName":{"type":"string","description":"The AWS bucket name. For more information refer to https://docs.aws.amazon.com/s3/\n"},"awsStorageBucketPrefix":{"type":"string","description":"The folder name in S3 bucket. For more information refer to https://docs.aws.amazon.com/s3/\n"},"awsStorageRegion":{"type":"string","description":"The region where the storage is located\n"},"awsStorageSecretAccessKey":{"type":"string","description":"AWS secret access key. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id*credentials*access-keys.html\n","secret":true},"azureStorageAccountName":{"type":"string","description":"Azure account name. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-overview\n"},"azureStorageClientId":{"type":"string","description":"Azure client id. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal\n"},"azureStorageClientSecret":{"type":"string","description":"Azure client secret. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal\n","secret":true},"azureStorageContainerName":{"type":"string","description":"Azure container name. For more information refer to https://learn.microsoft.com/en-us/rest/api/storageservices/naming-and-referencing-containers--blobs--and-metadata\n"},"azureStorageTenantId":{"type":"string","description":"Azure tenant id. For more information refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant\n"},"gatewayRemoteAccessRdpRecordingId":{"type":"string","description":"The ID of this resource.\n"},"rdpSessionRecording":{"type":"string","description":"Enable recording of rdp session [true/false]\n"},"rdpSessionStorage":{"type":"string","description":"Rdp session recording storage destination [local/aws/azure]\n"}},"type":"object","required":["gatewayRemoteAccessRdpRecordingId"],"inputProperties":{"awsStorageAccessKeyId":{"type":"string","description":"AWS access key id. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id*credentials*access-keys.html\n"},"awsStorageBucketName":{"type":"string","description":"The AWS bucket name. For more information refer to https://docs.aws.amazon.com/s3/\n"},"awsStorageBucketPrefix":{"type":"string","description":"The folder name in S3 bucket. For more information refer to https://docs.aws.amazon.com/s3/\n"},"awsStorageRegion":{"type":"string","description":"The region where the storage is located\n"},"awsStorageSecretAccessKey":{"type":"string","description":"AWS secret access key. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id*credentials*access-keys.html\n","secret":true},"azureStorageAccountName":{"type":"string","description":"Azure account name. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-overview\n"},"azureStorageClientId":{"type":"string","description":"Azure client id. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal\n"},"azureStorageClientSecret":{"type":"string","description":"Azure client secret. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal\n","secret":true},"azureStorageContainerName":{"type":"string","description":"Azure container name. For more information refer to https://learn.microsoft.com/en-us/rest/api/storageservices/naming-and-referencing-containers--blobs--and-metadata\n"},"azureStorageTenantId":{"type":"string","description":"Azure tenant id. For more information refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant\n"},"gatewayRemoteAccessRdpRecordingId":{"type":"string","description":"The ID of this resource.\n"},"rdpSessionRecording":{"type":"string","description":"Enable recording of rdp session [true/false]\n"},"rdpSessionStorage":{"type":"string","description":"Rdp session recording storage destination [local/aws/azure]\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering GatewayRemoteAccessRdpRecording resources.\n","properties":{"awsStorageAccessKeyId":{"type":"string","description":"AWS access key id. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id*credentials*access-keys.html\n"},"awsStorageBucketName":{"type":"string","description":"The AWS bucket name. For more information refer to https://docs.aws.amazon.com/s3/\n"},"awsStorageBucketPrefix":{"type":"string","description":"The folder name in S3 bucket. For more information refer to https://docs.aws.amazon.com/s3/\n"},"awsStorageRegion":{"type":"string","description":"The region where the storage is located\n"},"awsStorageSecretAccessKey":{"type":"string","description":"AWS secret access key. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id*credentials*access-keys.html\n","secret":true},"azureStorageAccountName":{"type":"string","description":"Azure account name. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-overview\n"},"azureStorageClientId":{"type":"string","description":"Azure client id. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal\n"},"azureStorageClientSecret":{"type":"string","description":"Azure client secret. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal\n","secret":true},"azureStorageContainerName":{"type":"string","description":"Azure container name. For more information refer to https://learn.microsoft.com/en-us/rest/api/storageservices/naming-and-referencing-containers--blobs--and-metadata\n"},"azureStorageTenantId":{"type":"string","description":"Azure tenant id. For more information refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant\n"},"gatewayRemoteAccessRdpRecordingId":{"type":"string","description":"The ID of this resource.\n"},"rdpSessionRecording":{"type":"string","description":"Enable recording of rdp session [true/false]\n"},"rdpSessionStorage":{"type":"string","description":"Rdp session recording storage destination [local/aws/azure]\n"}},"type":"object"}},"akeyless:index/k8sAuthConfig:K8sAuthConfig":{"description":"K8S Auth config\n","properties":{"accessId":{"type":"string","description":"The access ID of the Kubernetes auth method\n"},"clusterApiType":{"type":"string","description":"Cluster access type. options: [native_k8s, rancher]\n"},"disableIssuerValidation":{"type":"string","description":"Disable issuer validation [true/false]\n"},"k8sAuthConfigId":{"type":"string","description":"The ID of this resource.\n"},"k8sAuthType":{"type":"string","description":"Native K8S auth type, [token/certificate]. (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n"},"k8sCaCert":{"type":"string","description":"The CA Certificate (base64 encoded) to use to call into the kubernetes API server\n"},"k8sClientCertificate":{"type":"string","description":"Content of the k8 client certificate (PEM format) in a Base64 format (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n"},"k8sClientKey":{"type":"string","description":"Content of the k8 client private key (PEM format) in a Base64 format (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n","secret":true},"k8sHost":{"type":"string","description":"The URL of the kubernetes API server\n"},"k8sIssuer":{"type":"string","description":"The Kubernetes JWT issuer name. If not set, this \\n\\n will be used by default.\n"},"name":{"type":"string","description":"K8S Auth config name\n"},"rancherApiKey":{"type":"string","description":"The api key used to access the TokenReview API to validate other JWTs (relevant for rancher only)\n"},"rancherClusterId":{"type":"string","description":"The cluster id as define in rancher (relevant for rancher only)\n"},"signingKey":{"type":"string","description":"The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth\n","secret":true},"tokenExp":{"type":"number","description":"Time in seconds of expiration of the Akeyless Kube Auth Method token\n"},"tokenReviewerJwt":{"type":"string","description":"A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.\n","secret":true},"useLocalCaJwt":{"type":"boolean","description":"Use the GW's service account\n"}},"type":"object","required":["accessId","k8sAuthConfigId","name"],"inputProperties":{"accessId":{"type":"string","description":"The access ID of the Kubernetes auth method\n"},"clusterApiType":{"type":"string","description":"Cluster access type. options: [native_k8s, rancher]\n"},"disableIssuerValidation":{"type":"string","description":"Disable issuer validation [true/false]\n"},"k8sAuthConfigId":{"type":"string","description":"The ID of this resource.\n"},"k8sAuthType":{"type":"string","description":"Native K8S auth type, [token/certificate]. (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n"},"k8sCaCert":{"type":"string","description":"The CA Certificate (base64 encoded) to use to call into the kubernetes API server\n"},"k8sClientCertificate":{"type":"string","description":"Content of the k8 client certificate (PEM format) in a Base64 format (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n"},"k8sClientKey":{"type":"string","description":"Content of the k8 client private key (PEM format) in a Base64 format (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n","secret":true},"k8sHost":{"type":"string","description":"The URL of the kubernetes API server\n"},"k8sIssuer":{"type":"string","description":"The Kubernetes JWT issuer name. If not set, this \\n\\n will be used by default.\n"},"name":{"type":"string","description":"K8S Auth config name\n"},"rancherApiKey":{"type":"string","description":"The api key used to access the TokenReview API to validate other JWTs (relevant for rancher only)\n"},"rancherClusterId":{"type":"string","description":"The cluster id as define in rancher (relevant for rancher only)\n"},"signingKey":{"type":"string","description":"The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth\n","secret":true},"tokenExp":{"type":"number","description":"Time in seconds of expiration of the Akeyless Kube Auth Method token\n"},"tokenReviewerJwt":{"type":"string","description":"A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.\n","secret":true},"useLocalCaJwt":{"type":"boolean","description":"Use the GW's service account\n"}},"requiredInputs":["accessId"],"stateInputs":{"description":"Input properties used for looking up and filtering K8sAuthConfig resources.\n","properties":{"accessId":{"type":"string","description":"The access ID of the Kubernetes auth method\n"},"clusterApiType":{"type":"string","description":"Cluster access type. options: [native_k8s, rancher]\n"},"disableIssuerValidation":{"type":"string","description":"Disable issuer validation [true/false]\n"},"k8sAuthConfigId":{"type":"string","description":"The ID of this resource.\n"},"k8sAuthType":{"type":"string","description":"Native K8S auth type, [token/certificate]. (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n"},"k8sCaCert":{"type":"string","description":"The CA Certificate (base64 encoded) to use to call into the kubernetes API server\n"},"k8sClientCertificate":{"type":"string","description":"Content of the k8 client certificate (PEM format) in a Base64 format (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n"},"k8sClientKey":{"type":"string","description":"Content of the k8 client private key (PEM format) in a Base64 format (relevant for\u003cspan pulumi-lang-nodejs=\" nativeK8s \" pulumi-lang-dotnet=\" NativeK8s \" pulumi-lang-go=\" nativeK8s \" pulumi-lang-python=\" native_k8s \" pulumi-lang-yaml=\" nativeK8s \" pulumi-lang-java=\" nativeK8s \"\u003e native_k8s \u003c/span\u003eonly)\n","secret":true},"k8sHost":{"type":"string","description":"The URL of the kubernetes API server\n"},"k8sIssuer":{"type":"string","description":"The Kubernetes JWT issuer name. If not set, this \\n\\n will be used by default.\n"},"name":{"type":"string","description":"K8S Auth config name\n"},"rancherApiKey":{"type":"string","description":"The api key used to access the TokenReview API to validate other JWTs (relevant for rancher only)\n"},"rancherClusterId":{"type":"string","description":"The cluster id as define in rancher (relevant for rancher only)\n"},"signingKey":{"type":"string","description":"The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth\n","secret":true},"tokenExp":{"type":"number","description":"Time in seconds of expiration of the Akeyless Kube Auth Method token\n"},"tokenReviewerJwt":{"type":"string","description":"A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.\n","secret":true},"useLocalCaJwt":{"type":"boolean","description":"Use the GW's service account\n"}},"type":"object"}},"akeyless:index/pkiCertIssuer:PkiCertIssuer":{"description":"PKI Cert Issuer  resource\n","properties":{"allowAnyName":{"type":"boolean","description":"If set, clients can request certificates for any CN\n"},"allowCopyExtFromCsr":{"type":"boolean","description":"If set, will allow copying the extra extensions from the csr file (if given)\n"},"allowSubdomains":{"type":"boolean","description":"If set, clients can request certificates for subdomains and wildcard subdomains of the allowed domains\n"},"allowedDomains":{"type":"string","description":"A list of the allowed domains that clients can request to be included in the certificate (in a comma-delimited list)\n"},"allowedExtraExtensions":{"type":"string","description":"A json string that defines the allowed extra extensions for the pki cert issuer\n"},"allowedIpSans":{"type":"string","description":"A list of the allowed CIDRs for IPs that clients can request to be included in the certificate as part of the IP Subject Alternative Names (in a comma-delimited list)\n"},"allowedUriSans":{"type":"string","description":"A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list)\n"},"autoRenew":{"type":"boolean","description":"Automatically renew certificates before expiration\n"},"caTarget":{"type":"string","description":"The name of an existing CA target to attach this PKI Certificate Issuer to, required in Public CA mode\n"},"clientFlag":{"type":"boolean","description":"If set, certificates will be flagged for client auth use\n"},"codeSigningFlag":{"type":"boolean","description":"If set, certificates will be flagged for code signing use\n"},"country":{"type":"string","description":"A comma-separated list of countries that will be set in the issued certificate\n"},"createPrivateCrl":{"type":"boolean","description":"Set this to allow the issuer will expose a CRL endpoint in the Gateway\n"},"createPublicCrl":{"type":"boolean","description":"Set this to allow the cert issuer will expose a public CRL endpoint\n"},"criticalKeyUsage":{"type":"string","description":"Mark key usage as critical [true/false]\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"destinationPath":{"type":"string","description":"A path in Akeyless which to save generated certificates\n"},"enableAcme":{"type":"boolean","description":"If set, the cert issuer will support the acme protocol\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified\n"},"gwClusterUrl":{"type":"string","description":"The GW cluster URL to issue the certificate from, required in Public CA mode\n"},"isCa":{"type":"boolean","description":"If set, the basic constraints extension will be added to certificate\n"},"keyUsage":{"type":"string","description":"A comma-separated string or list of key usages\n"},"locality":{"type":"string","description":"A comma-separated list of localities that will be set in the issued certificate\n"},"name":{"type":"string","description":"PKI certificate issuer name\n"},"notEnforceHostnames":{"type":"boolean","description":"If set, any names are allowed for CN and SANs in the certificate and not only a valid host name\n"},"notRequireCn":{"type":"boolean","description":"If set, clients can request certificates without a CN\n"},"organizationalUnits":{"type":"string","description":"A comma-separated list of organizational units (OU) that will be set in the issued certificate\n"},"organizations":{"type":"string","description":"A comma-separated list of organizations (O) that will be set in the issued certificate\n"},"pkiCertIssuerId":{"type":"string","description":"The ID of this resource.\n"},"postalCode":{"type":"string","description":"A comma-separated list of postal codes that will be set in the issued certificate\n"},"protectCertificates":{"type":"boolean","description":"Whether to protect generated certificates from deletion\n"},"province":{"type":"string","description":"A comma-separated list of provinces that will be set in the issued certificate\n"},"scheduledRenew":{"type":"number","description":"Number of days before expiration to renew certificates\n"},"serverFlag":{"type":"boolean","description":"If set, certificates will be flagged for server auth use\n"},"signerKeyName":{"type":"string","description":"A key to sign the certificate with, required in Private CA mode\n"},"streetAddress":{"type":"string","description":"A comma-separated list of street addresses that will be set in the issued certificate\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key\n"},"ttl":{"type":"string","description":"The maximum requested Time To Live for issued certificate by default in seconds, supported formats are s,m,h,d. In case of Public CA, this is based on the CA target's supported maximum TTLs\n"}},"type":"object","required":["name","pkiCertIssuerId","ttl"],"inputProperties":{"allowAnyName":{"type":"boolean","description":"If set, clients can request certificates for any CN\n"},"allowCopyExtFromCsr":{"type":"boolean","description":"If set, will allow copying the extra extensions from the csr file (if given)\n"},"allowSubdomains":{"type":"boolean","description":"If set, clients can request certificates for subdomains and wildcard subdomains of the allowed domains\n"},"allowedDomains":{"type":"string","description":"A list of the allowed domains that clients can request to be included in the certificate (in a comma-delimited list)\n"},"allowedExtraExtensions":{"type":"string","description":"A json string that defines the allowed extra extensions for the pki cert issuer\n"},"allowedIpSans":{"type":"string","description":"A list of the allowed CIDRs for IPs that clients can request to be included in the certificate as part of the IP Subject Alternative Names (in a comma-delimited list)\n"},"allowedUriSans":{"type":"string","description":"A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list)\n"},"autoRenew":{"type":"boolean","description":"Automatically renew certificates before expiration\n"},"caTarget":{"type":"string","description":"The name of an existing CA target to attach this PKI Certificate Issuer to, required in Public CA mode\n"},"clientFlag":{"type":"boolean","description":"If set, certificates will be flagged for client auth use\n"},"codeSigningFlag":{"type":"boolean","description":"If set, certificates will be flagged for code signing use\n"},"country":{"type":"string","description":"A comma-separated list of countries that will be set in the issued certificate\n"},"createPrivateCrl":{"type":"boolean","description":"Set this to allow the issuer will expose a CRL endpoint in the Gateway\n"},"createPublicCrl":{"type":"boolean","description":"Set this to allow the cert issuer will expose a public CRL endpoint\n"},"criticalKeyUsage":{"type":"string","description":"Mark key usage as critical [true/false]\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"destinationPath":{"type":"string","description":"A path in Akeyless which to save generated certificates\n"},"enableAcme":{"type":"boolean","description":"If set, the cert issuer will support the acme protocol\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified\n"},"gwClusterUrl":{"type":"string","description":"The GW cluster URL to issue the certificate from, required in Public CA mode\n"},"isCa":{"type":"boolean","description":"If set, the basic constraints extension will be added to certificate\n"},"keyUsage":{"type":"string","description":"A comma-separated string or list of key usages\n"},"locality":{"type":"string","description":"A comma-separated list of localities that will be set in the issued certificate\n"},"name":{"type":"string","description":"PKI certificate issuer name\n"},"notEnforceHostnames":{"type":"boolean","description":"If set, any names are allowed for CN and SANs in the certificate and not only a valid host name\n"},"notRequireCn":{"type":"boolean","description":"If set, clients can request certificates without a CN\n"},"organizationalUnits":{"type":"string","description":"A comma-separated list of organizational units (OU) that will be set in the issued certificate\n"},"organizations":{"type":"string","description":"A comma-separated list of organizations (O) that will be set in the issued certificate\n"},"pkiCertIssuerId":{"type":"string","description":"The ID of this resource.\n"},"postalCode":{"type":"string","description":"A comma-separated list of postal codes that will be set in the issued certificate\n"},"protectCertificates":{"type":"boolean","description":"Whether to protect generated certificates from deletion\n"},"province":{"type":"string","description":"A comma-separated list of provinces that will be set in the issued certificate\n"},"scheduledRenew":{"type":"number","description":"Number of days before expiration to renew certificates\n"},"serverFlag":{"type":"boolean","description":"If set, certificates will be flagged for server auth use\n"},"signerKeyName":{"type":"string","description":"A key to sign the certificate with, required in Private CA mode\n"},"streetAddress":{"type":"string","description":"A comma-separated list of street addresses that will be set in the issued certificate\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key\n"},"ttl":{"type":"string","description":"The maximum requested Time To Live for issued certificate by default in seconds, supported formats are s,m,h,d. In case of Public CA, this is based on the CA target's supported maximum TTLs\n"}},"requiredInputs":["ttl"],"stateInputs":{"description":"Input properties used for looking up and filtering PkiCertIssuer resources.\n","properties":{"allowAnyName":{"type":"boolean","description":"If set, clients can request certificates for any CN\n"},"allowCopyExtFromCsr":{"type":"boolean","description":"If set, will allow copying the extra extensions from the csr file (if given)\n"},"allowSubdomains":{"type":"boolean","description":"If set, clients can request certificates for subdomains and wildcard subdomains of the allowed domains\n"},"allowedDomains":{"type":"string","description":"A list of the allowed domains that clients can request to be included in the certificate (in a comma-delimited list)\n"},"allowedExtraExtensions":{"type":"string","description":"A json string that defines the allowed extra extensions for the pki cert issuer\n"},"allowedIpSans":{"type":"string","description":"A list of the allowed CIDRs for IPs that clients can request to be included in the certificate as part of the IP Subject Alternative Names (in a comma-delimited list)\n"},"allowedUriSans":{"type":"string","description":"A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list)\n"},"autoRenew":{"type":"boolean","description":"Automatically renew certificates before expiration\n"},"caTarget":{"type":"string","description":"The name of an existing CA target to attach this PKI Certificate Issuer to, required in Public CA mode\n"},"clientFlag":{"type":"boolean","description":"If set, certificates will be flagged for client auth use\n"},"codeSigningFlag":{"type":"boolean","description":"If set, certificates will be flagged for code signing use\n"},"country":{"type":"string","description":"A comma-separated list of countries that will be set in the issued certificate\n"},"createPrivateCrl":{"type":"boolean","description":"Set this to allow the issuer will expose a CRL endpoint in the Gateway\n"},"createPublicCrl":{"type":"boolean","description":"Set this to allow the cert issuer will expose a public CRL endpoint\n"},"criticalKeyUsage":{"type":"string","description":"Mark key usage as critical [true/false]\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"destinationPath":{"type":"string","description":"A path in Akeyless which to save generated certificates\n"},"enableAcme":{"type":"boolean","description":"If set, the cert issuer will support the acme protocol\n"},"expirationEventIns":{"type":"array","items":{"type":"string"},"description":"How many days before the expiration of the certificate would you like to be notified\n"},"gwClusterUrl":{"type":"string","description":"The GW cluster URL to issue the certificate from, required in Public CA mode\n"},"isCa":{"type":"boolean","description":"If set, the basic constraints extension will be added to certificate\n"},"keyUsage":{"type":"string","description":"A comma-separated string or list of key usages\n"},"locality":{"type":"string","description":"A comma-separated list of localities that will be set in the issued certificate\n"},"name":{"type":"string","description":"PKI certificate issuer name\n"},"notEnforceHostnames":{"type":"boolean","description":"If set, any names are allowed for CN and SANs in the certificate and not only a valid host name\n"},"notRequireCn":{"type":"boolean","description":"If set, clients can request certificates without a CN\n"},"organizationalUnits":{"type":"string","description":"A comma-separated list of organizational units (OU) that will be set in the issued certificate\n"},"organizations":{"type":"string","description":"A comma-separated list of organizations (O) that will be set in the issued certificate\n"},"pkiCertIssuerId":{"type":"string","description":"The ID of this resource.\n"},"postalCode":{"type":"string","description":"A comma-separated list of postal codes that will be set in the issued certificate\n"},"protectCertificates":{"type":"boolean","description":"Whether to protect generated certificates from deletion\n"},"province":{"type":"string","description":"A comma-separated list of provinces that will be set in the issued certificate\n"},"scheduledRenew":{"type":"number","description":"Number of days before expiration to renew certificates\n"},"serverFlag":{"type":"boolean","description":"If set, certificates will be flagged for server auth use\n"},"signerKeyName":{"type":"string","description":"A key to sign the certificate with, required in Private CA mode\n"},"streetAddress":{"type":"string","description":"A comma-separated list of street addresses that will be set in the issued certificate\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key\n"},"ttl":{"type":"string","description":"The maximum requested Time To Live for issued certificate by default in seconds, supported formats are s,m,h,d. In case of Public CA, this is based on the CA target's supported maximum TTLs\n"}},"type":"object"}},"akeyless:index/producerArtifactory:ProducerArtifactory":{"description":"Artifactory producer resource\n","properties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"artifactoryTokenAudience":{"type":"string","description":"A space-separate list of the other Artifactory instances or services that should accept this token., for example: jfrt@*\n"},"artifactoryTokenScope":{"type":"string","description":"Token scope provided as a space-separated list, for example: member-of-groups:readers\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"name":{"type":"string","description":"Producer name\n"},"producerArtifactoryId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["artifactoryTokenAudience","artifactoryTokenScope","name","producerArtifactoryId"],"inputProperties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"artifactoryTokenAudience":{"type":"string","description":"A space-separate list of the other Artifactory instances or services that should accept this token., for example: jfrt@*\n"},"artifactoryTokenScope":{"type":"string","description":"Token scope provided as a space-separated list, for example: member-of-groups:readers\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"name":{"type":"string","description":"Producer name\n"},"producerArtifactoryId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"requiredInputs":["artifactoryTokenAudience","artifactoryTokenScope"],"stateInputs":{"description":"Input properties used for looking up and filtering ProducerArtifactory resources.\n","properties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"artifactoryTokenAudience":{"type":"string","description":"A space-separate list of the other Artifactory instances or services that should accept this token., for example: jfrt@*\n"},"artifactoryTokenScope":{"type":"string","description":"Token scope provided as a space-separated list, for example: member-of-groups:readers\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"name":{"type":"string","description":"Producer name\n"},"producerArtifactoryId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerAws:ProducerAws":{"description":"AWS producer resource\n","properties":{"accessMode":{"type":"string","description":"The types of credentials to retrieve from AWS. Options:[iam*user,assume*role]\n"},"awsAccessKeyId":{"type":"string","description":"Access Key ID\n"},"awsAccessSecretKey":{"type":"string","description":"Access Secret Key\n","secret":true},"awsRoleArns":{"type":"string","description":"AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma\n"},"awsUserConsoleAccess":{"type":"boolean","description":"Enable AWS User console access\n"},"awsUserGroups":{"type":"string","description":"UserGroup name(s). Multiple values should be separated by comma\n"},"awsUserPolicies":{"type":"string","description":"Policy ARN(s). Multiple values should be separated by comma\n"},"awsUserProgrammaticAccess":{"type":"boolean","description":"Enable AWS User programmatic access\n"},"name":{"type":"string","description":"Producer name\n"},"producerAwsId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"region":{"type":"string","description":"Region\n"},"secureAccessAwsAccountId":{"type":"string","description":"The aws account id\n"},"secureAccessAwsNativeCli":{"type":"boolean","description":"The aws native cli\n"},"secureAccessAwsRegion":{"type":"string"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerAwsId","secureAccessAwsRegion","secureAccessUrl"],"inputProperties":{"accessMode":{"type":"string","description":"The types of credentials to retrieve from AWS. Options:[iam*user,assume*role]\n"},"awsAccessKeyId":{"type":"string","description":"Access Key ID\n"},"awsAccessSecretKey":{"type":"string","description":"Access Secret Key\n","secret":true},"awsRoleArns":{"type":"string","description":"AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma\n"},"awsUserConsoleAccess":{"type":"boolean","description":"Enable AWS User console access\n"},"awsUserGroups":{"type":"string","description":"UserGroup name(s). Multiple values should be separated by comma\n"},"awsUserPolicies":{"type":"string","description":"Policy ARN(s). Multiple values should be separated by comma\n"},"awsUserProgrammaticAccess":{"type":"boolean","description":"Enable AWS User programmatic access\n"},"name":{"type":"string","description":"Producer name\n"},"producerAwsId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"region":{"type":"string","description":"Region\n"},"secureAccessAwsAccountId":{"type":"string","description":"The aws account id\n"},"secureAccessAwsNativeCli":{"type":"boolean","description":"The aws native cli\n"},"secureAccessAwsRegion":{"type":"string"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerAws resources.\n","properties":{"accessMode":{"type":"string","description":"The types of credentials to retrieve from AWS. Options:[iam*user,assume*role]\n"},"awsAccessKeyId":{"type":"string","description":"Access Key ID\n"},"awsAccessSecretKey":{"type":"string","description":"Access Secret Key\n","secret":true},"awsRoleArns":{"type":"string","description":"AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma\n"},"awsUserConsoleAccess":{"type":"boolean","description":"Enable AWS User console access\n"},"awsUserGroups":{"type":"string","description":"UserGroup name(s). Multiple values should be separated by comma\n"},"awsUserPolicies":{"type":"string","description":"Policy ARN(s). Multiple values should be separated by comma\n"},"awsUserProgrammaticAccess":{"type":"boolean","description":"Enable AWS User programmatic access\n"},"name":{"type":"string","description":"Producer name\n"},"producerAwsId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"region":{"type":"string","description":"Region\n"},"secureAccessAwsAccountId":{"type":"string","description":"The aws account id\n"},"secureAccessAwsNativeCli":{"type":"boolean","description":"The aws native cli\n"},"secureAccessAwsRegion":{"type":"string"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerAzure:ProducerAzure":{"description":"Azure AD producer resource\n","properties":{"appObjId":{"type":"string","description":"Azure App Object ID (required if selected programmatic access)\n"},"azureClientId":{"type":"string","description":"Azure Client ID (Application ID)\n"},"azureClientSecret":{"type":"string","description":"Azure AD Client Secret\n","secret":true},"azureTenantId":{"type":"string","description":"Azure Tenant ID\n"},"name":{"type":"string","description":"Producer name\n"},"producerAzureId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userGroupObjId":{"type":"string","description":"Azure AD User Group Object ID (required if selected Portal access)\n"},"userPortalAccess":{"type":"boolean","description":"Enable Azure AD user portal access\n"},"userPrincipalName":{"type":"string","description":"Azure AD User Principal Name (required if selected Portal access)\n"},"userProgrammaticAccess":{"type":"boolean","description":"Enable Azure AD user programmatic access\n"},"userRoleTemplateId":{"type":"string","description":"Azure AD User Role Template ID (required if selected Portal access)\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerAzureId","secureAccessUrl"],"inputProperties":{"appObjId":{"type":"string","description":"Azure App Object ID (required if selected programmatic access)\n"},"azureClientId":{"type":"string","description":"Azure Client ID (Application ID)\n"},"azureClientSecret":{"type":"string","description":"Azure AD Client Secret\n","secret":true},"azureTenantId":{"type":"string","description":"Azure Tenant ID\n"},"name":{"type":"string","description":"Producer name\n"},"producerAzureId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userGroupObjId":{"type":"string","description":"Azure AD User Group Object ID (required if selected Portal access)\n"},"userPortalAccess":{"type":"boolean","description":"Enable Azure AD user portal access\n"},"userPrincipalName":{"type":"string","description":"Azure AD User Principal Name (required if selected Portal access)\n"},"userProgrammaticAccess":{"type":"boolean","description":"Enable Azure AD user programmatic access\n"},"userRoleTemplateId":{"type":"string","description":"Azure AD User Role Template ID (required if selected Portal access)\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerAzure resources.\n","properties":{"appObjId":{"type":"string","description":"Azure App Object ID (required if selected programmatic access)\n"},"azureClientId":{"type":"string","description":"Azure Client ID (Application ID)\n"},"azureClientSecret":{"type":"string","description":"Azure AD Client Secret\n","secret":true},"azureTenantId":{"type":"string","description":"Azure Tenant ID\n"},"name":{"type":"string","description":"Producer name\n"},"producerAzureId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessUrl":{"type":"string"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userGroupObjId":{"type":"string","description":"Azure AD User Group Object ID (required if selected Portal access)\n"},"userPortalAccess":{"type":"boolean","description":"Enable Azure AD user portal access\n"},"userPrincipalName":{"type":"string","description":"Azure AD User Principal Name (required if selected Portal access)\n"},"userProgrammaticAccess":{"type":"boolean","description":"Enable Azure AD user programmatic access\n"},"userRoleTemplateId":{"type":"string","description":"Azure AD User Role Template ID (required if selected Portal access)\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerCassandra:ProducerCassandra":{"description":"Cassandra producer resource\n","properties":{"cassandraCreationStatements":{"type":"string","description":"Cassandra Creation Statements\n"},"cassandraHosts":{"type":"string","description":"Cassandra hosts names or IP addresses, comma separated\n"},"cassandraPassword":{"type":"string","description":"Cassandra superuser password\n"},"cassandraPort":{"type":"string","description":"Cassandra port\n"},"cassandraUsername":{"type":"string","description":"Cassandra superuser user name\n"},"name":{"type":"string","description":"Producer name\n"},"producerCassandraId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Dynamic producer encryption key\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Target name\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object","required":["name","producerCassandraId"],"inputProperties":{"cassandraCreationStatements":{"type":"string","description":"Cassandra Creation Statements\n"},"cassandraHosts":{"type":"string","description":"Cassandra hosts names or IP addresses, comma separated\n"},"cassandraPassword":{"type":"string","description":"Cassandra superuser password\n"},"cassandraPort":{"type":"string","description":"Cassandra port\n"},"cassandraUsername":{"type":"string","description":"Cassandra superuser user name\n"},"name":{"type":"string","description":"Producer name\n"},"producerCassandraId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Dynamic producer encryption key\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Target name\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerCassandra resources.\n","properties":{"cassandraCreationStatements":{"type":"string","description":"Cassandra Creation Statements\n"},"cassandraHosts":{"type":"string","description":"Cassandra hosts names or IP addresses, comma separated\n"},"cassandraPassword":{"type":"string","description":"Cassandra superuser password\n"},"cassandraPort":{"type":"string","description":"Cassandra port\n"},"cassandraUsername":{"type":"string","description":"Cassandra superuser user name\n"},"name":{"type":"string","description":"Producer name\n"},"producerCassandraId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Dynamic producer encryption key\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Target name\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object"}},"akeyless:index/producerCustom:ProducerCustom":{"description":"Custom producer resource\n","properties":{"adminRotationIntervalDays":{"type":"number","description":"Rotation period in days\n"},"createSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/create method\n"},"enableAdminRotation":{"type":"boolean","description":"Enable automatic admin credentials rotation\n"},"name":{"type":"string","description":"Producer name\n"},"payload":{"type":"string","description":"Secret payload to be sent with each create/revoke webhook request\n"},"producerCustomId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"revokeSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/revoke method\n"},"rotateSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/rotate method\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"timeoutSec":{"type":"number","description":"Maximum allowed time in seconds for the webhook to return the results\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["createSyncUrl","name","producerCustomId","revokeSyncUrl"],"inputProperties":{"adminRotationIntervalDays":{"type":"number","description":"Rotation period in days\n"},"createSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/create method\n"},"enableAdminRotation":{"type":"boolean","description":"Enable automatic admin credentials rotation\n"},"name":{"type":"string","description":"Producer name\n"},"payload":{"type":"string","description":"Secret payload to be sent with each create/revoke webhook request\n"},"producerCustomId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"revokeSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/revoke method\n"},"rotateSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/rotate method\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"timeoutSec":{"type":"number","description":"Maximum allowed time in seconds for the webhook to return the results\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"requiredInputs":["createSyncUrl","revokeSyncUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering ProducerCustom resources.\n","properties":{"adminRotationIntervalDays":{"type":"number","description":"Rotation period in days\n"},"createSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/create method\n"},"enableAdminRotation":{"type":"boolean","description":"Enable automatic admin credentials rotation\n"},"name":{"type":"string","description":"Producer name\n"},"payload":{"type":"string","description":"Secret payload to be sent with each create/revoke webhook request\n"},"producerCustomId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"revokeSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/revoke method\n"},"rotateSyncUrl":{"type":"string","description":"URL of an endpoint that implements /sync/rotate method\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"timeoutSec":{"type":"number","description":"Maximum allowed time in seconds for the webhook to return the results\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerEks:ProducerEks":{"description":"Amazon Elastic Kubernetes Service (Amazon EKS) producer\n","properties":{"eksAccessKeyId":{"type":"string","description":"EKS Access Key ID\n"},"eksAssumeRole":{"type":"string","description":"Role ARN. Role to assume when connecting to the EKS cluster\n"},"eksClusterCaCert":{"type":"string","description":"EKS Cluster certificate. Base 64 encoded certificate.\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"eksClusterName":{"type":"string","description":"EKS cluster name. Must match the EKS cluster name you want to connect to.\n"},"eksRegion":{"type":"string","description":"EKS Region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS Secret Access Key\n","secret":true},"name":{"type":"string","description":"Producer name\n"},"producerEksId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerEksId"],"inputProperties":{"eksAccessKeyId":{"type":"string","description":"EKS Access Key ID\n"},"eksAssumeRole":{"type":"string","description":"Role ARN. Role to assume when connecting to the EKS cluster\n"},"eksClusterCaCert":{"type":"string","description":"EKS Cluster certificate. Base 64 encoded certificate.\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"eksClusterName":{"type":"string","description":"EKS cluster name. Must match the EKS cluster name you want to connect to.\n"},"eksRegion":{"type":"string","description":"EKS Region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS Secret Access Key\n","secret":true},"name":{"type":"string","description":"Producer name\n"},"producerEksId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerEks resources.\n","properties":{"eksAccessKeyId":{"type":"string","description":"EKS Access Key ID\n"},"eksAssumeRole":{"type":"string","description":"Role ARN. Role to assume when connecting to the EKS cluster\n"},"eksClusterCaCert":{"type":"string","description":"EKS Cluster certificate. Base 64 encoded certificate.\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"eksClusterName":{"type":"string","description":"EKS cluster name. Must match the EKS cluster name you want to connect to.\n"},"eksRegion":{"type":"string","description":"EKS Region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS Secret Access Key\n","secret":true},"name":{"type":"string","description":"Producer name\n"},"producerEksId":{"type":"string","description":"The ID of this resource.\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerGcp:ProducerGcp":{"description":"Google Cloud Provider (GCP)  producer resource\n","properties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"gcpCredType":{"type":"string","description":"Credentials type, options are [token, key]\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpKeyAlgo":{"type":"string","description":"Service account key algorithm, e.g. KEY*ALG*RSA_1024\n"},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"gcpTokenScopes":{"type":"string","description":"Access token scopes list, e.g. scope1,scope2\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Dynamic producer encryption key\n"},"producerGcpId":{"type":"string","description":"The ID of this resource.\n"},"roleBinding":{"type":"string","description":"Role binding definitions in json format\n"},"serviceAccountType":{"type":"string","description":"The type of the gcp dynamic secret. Options[fixed, dynamic]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object","required":["name","producerGcpId"],"inputProperties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"gcpCredType":{"type":"string","description":"Credentials type, options are [token, key]\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpKeyAlgo":{"type":"string","description":"Service account key algorithm, e.g. KEY*ALG*RSA_1024\n"},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"gcpTokenScopes":{"type":"string","description":"Access token scopes list, e.g. scope1,scope2\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Dynamic producer encryption key\n"},"producerGcpId":{"type":"string","description":"The ID of this resource.\n"},"roleBinding":{"type":"string","description":"Role binding definitions in json format\n"},"serviceAccountType":{"type":"string","description":"The type of the gcp dynamic secret. Options[fixed, dynamic]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerGcp resources.\n","properties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"gcpCredType":{"type":"string","description":"Credentials type, options are [token, key]\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpKeyAlgo":{"type":"string","description":"Service account key algorithm, e.g. KEY*ALG*RSA_1024\n"},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"gcpTokenScopes":{"type":"string","description":"Access token scopes list, e.g. scope1,scope2\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Dynamic producer encryption key\n"},"producerGcpId":{"type":"string","description":"The ID of this resource.\n"},"roleBinding":{"type":"string","description":"Role binding definitions in json format\n"},"serviceAccountType":{"type":"string","description":"The type of the gcp dynamic secret. Options[fixed, dynamic]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL (\u003c=60m for access token)\n"}},"type":"object"}},"akeyless:index/producerGithub:ProducerGithub":{"description":"Github producer resource.\n","properties":{"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"installationId":{"type":"number","description":"Github application installation id\n"},"installationRepository":{"type":"string","description":"Optional, instead of installation id, set a GitHub repository '\\n\\n/\\n\\n'\n"},"name":{"type":"string","description":"Producer name\n"},"producerGithubId":{"type":"string","description":"The ID of this resource.\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"tokenPermissions":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed permissions. By default use installation allowed permissions. Input format: key=value pairs or JSON strings, e.g - -p contents=read -p issues=write or -p '{content:read}'\n"},"tokenRepositories":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed repositories. By default use installation allowed repositories. To specify multiple repositories use argument multiple times: -r RepoName1 -r RepoName2\n"}},"type":"object","required":["name","producerGithubId"],"inputProperties":{"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"installationId":{"type":"number","description":"Github application installation id\n"},"installationRepository":{"type":"string","description":"Optional, instead of installation id, set a GitHub repository '\\n\\n/\\n\\n'\n"},"name":{"type":"string","description":"Producer name\n"},"producerGithubId":{"type":"string","description":"The ID of this resource.\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"tokenPermissions":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed permissions. By default use installation allowed permissions. Input format: key=value pairs or JSON strings, e.g - -p contents=read -p issues=write or -p '{content:read}'\n"},"tokenRepositories":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed repositories. By default use installation allowed repositories. To specify multiple repositories use argument multiple times: -r RepoName1 -r RepoName2\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerGithub resources.\n","properties":{"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"installationId":{"type":"number","description":"Github application installation id\n"},"installationRepository":{"type":"string","description":"Optional, instead of installation id, set a GitHub repository '\\n\\n/\\n\\n'\n"},"name":{"type":"string","description":"Producer name\n"},"producerGithubId":{"type":"string","description":"The ID of this resource.\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"tokenPermissions":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed permissions. By default use installation allowed permissions. Input format: key=value pairs or JSON strings, e.g - -p contents=read -p issues=write or -p '{content:read}'\n"},"tokenRepositories":{"type":"array","items":{"type":"string"},"description":"Tokens' allowed repositories. By default use installation allowed repositories. To specify multiple repositories use argument multiple times: -r RepoName1 -r RepoName2\n"}},"type":"object"}},"akeyless:index/producerGke:ProducerGke":{"description":"Google Kubernetes Engine (GKE) producer resource\n","properties":{"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerGkeId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerGkeId"],"inputProperties":{"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerGkeId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerGke resources.\n","properties":{"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerGkeId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint URL\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerK8s:ProducerK8s":{"description":"Native Kubernetes Service producer resource\n","properties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item [true/false]\n"},"k8sAllowedNamespaces":{"type":"string","description":"Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n","secret":true},"k8sNamespace":{"type":"string","description":"K8S Namespace where the ServiceAccount exists.\n"},"k8sPredefinedRoleName":{"type":"string","description":"The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).\n"},"k8sPredefinedRoleType":{"type":"string","description":"Specifies the type of the pre-existing K8S role Role, ClusterRole.\n"},"k8sServiceAccount":{"type":"string","description":"K8S ServiceAccount to extract token from.\n"},"k8sServiceAccountType":{"type":"string","description":"K8S ServiceAccount type [fixed, dynamic].\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerK8sId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint\n"},"secureAccessDashboardUrl":{"type":"string","description":"The K8s dashboard url\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"secureAccessWebProxy":{"type":"boolean","description":"Web-Proxy via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerK8sId"],"inputProperties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item [true/false]\n"},"k8sAllowedNamespaces":{"type":"string","description":"Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n","secret":true},"k8sNamespace":{"type":"string","description":"K8S Namespace where the ServiceAccount exists.\n"},"k8sPredefinedRoleName":{"type":"string","description":"The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).\n"},"k8sPredefinedRoleType":{"type":"string","description":"Specifies the type of the pre-existing K8S role Role, ClusterRole.\n"},"k8sServiceAccount":{"type":"string","description":"K8S ServiceAccount to extract token from.\n"},"k8sServiceAccountType":{"type":"string","description":"K8S ServiceAccount type [fixed, dynamic].\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerK8sId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint\n"},"secureAccessDashboardUrl":{"type":"string","description":"The K8s dashboard url\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"secureAccessWebProxy":{"type":"boolean","description":"Web-Proxy via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerK8s resources.\n","properties":{"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item [true/false]\n"},"k8sAllowedNamespaces":{"type":"string","description":"Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic).\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n","secret":true},"k8sNamespace":{"type":"string","description":"K8S Namespace where the ServiceAccount exists.\n"},"k8sPredefinedRoleName":{"type":"string","description":"The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic).\n"},"k8sPredefinedRoleType":{"type":"string","description":"Specifies the type of the pre-existing K8S role Role, ClusterRole.\n"},"k8sServiceAccount":{"type":"string","description":"K8S ServiceAccount to extract token from.\n"},"k8sServiceAccountType":{"type":"string","description":"K8S ServiceAccount type [fixed, dynamic].\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerK8sId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessAllowPortForwading":{"type":"boolean","description":"Enable Port forwarding while using CLI access.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessClusterEndpoint":{"type":"string","description":"The K8s cluster endpoint\n"},"secureAccessDashboardUrl":{"type":"string","description":"The K8s dashboard url\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless Web Access Bastion\n"},"secureAccessWebProxy":{"type":"boolean","description":"Web-Proxy via Akeyless Web Access Bastion\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerMongo:ProducerMongo":{"description":"Mongo DB Producer resource\n","properties":{"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbHostPort":{"type":"string","description":"host:port (e.g. my.mongo.db:27017)\n"},"mongodbName":{"type":"string","description":"MongoDB name\n"},"mongodbPassword":{"type":"string","description":"MongoDB server password\n"},"mongodbRoles":{"type":"string","description":"MongoDB roles (e.g. MongoDB:[{role:readWrite, db: sales}], MongoDB Atlas:[{roleName : readWrite, databaseName: sales}])\n"},"mongodbServerUri":{"type":"string","description":"MongoDB server URI (e.g. mongodb://user:password@my.mongo.db:27017/admin?replicaSet=mySet)\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"mongodbUsername":{"type":"string","description":"MongoDB server username\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMongoId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL (e.g. 60s, 60m, 60h)\n"}},"type":"object","required":["name","producerMongoId","secureAccessDbName"],"inputProperties":{"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbHostPort":{"type":"string","description":"host:port (e.g. my.mongo.db:27017)\n"},"mongodbName":{"type":"string","description":"MongoDB name\n"},"mongodbPassword":{"type":"string","description":"MongoDB server password\n"},"mongodbRoles":{"type":"string","description":"MongoDB roles (e.g. MongoDB:[{role:readWrite, db: sales}], MongoDB Atlas:[{roleName : readWrite, databaseName: sales}])\n"},"mongodbServerUri":{"type":"string","description":"MongoDB server URI (e.g. mongodb://user:password@my.mongo.db:27017/admin?replicaSet=mySet)\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"mongodbUsername":{"type":"string","description":"MongoDB server username\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMongoId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL (e.g. 60s, 60m, 60h)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerMongo resources.\n","properties":{"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbHostPort":{"type":"string","description":"host:port (e.g. my.mongo.db:27017)\n"},"mongodbName":{"type":"string","description":"MongoDB name\n"},"mongodbPassword":{"type":"string","description":"MongoDB server password\n"},"mongodbRoles":{"type":"string","description":"MongoDB roles (e.g. MongoDB:[{role:readWrite, db: sales}], MongoDB Atlas:[{roleName : readWrite, databaseName: sales}])\n"},"mongodbServerUri":{"type":"string","description":"MongoDB server URI (e.g. mongodb://user:password@my.mongo.db:27017/admin?replicaSet=mySet)\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"mongodbUsername":{"type":"string","description":"MongoDB server username\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMongoId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL (e.g. 60s, 60m, 60h)\n"}},"type":"object"}},"akeyless:index/producerMssql:ProducerMssql":{"description":"Microsoft SQL Server producer resource\n","properties":{"mssqlCreateStatements":{"type":"string","description":"MSSQL Server Creation Statements\n"},"mssqlDbname":{"type":"string","description":"MSSQL Server DB Name\n"},"mssqlHost":{"type":"string","description":"MS SQL Server host name\n"},"mssqlPassword":{"type":"string","description":"MS SQL Server password\n"},"mssqlPort":{"type":"string","description":"MS SQL Server port\n"},"mssqlRevocationStatements":{"type":"string","description":"MSSQL Server Revocation Statements\n"},"mssqlUsername":{"type":"string","description":"MS SQL Server user\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMssqlId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerMssqlId","secureAccessDbName"],"inputProperties":{"mssqlCreateStatements":{"type":"string","description":"MSSQL Server Creation Statements\n"},"mssqlDbname":{"type":"string","description":"MSSQL Server DB Name\n"},"mssqlHost":{"type":"string","description":"MS SQL Server host name\n"},"mssqlPassword":{"type":"string","description":"MS SQL Server password\n"},"mssqlPort":{"type":"string","description":"MS SQL Server port\n"},"mssqlRevocationStatements":{"type":"string","description":"MSSQL Server Revocation Statements\n"},"mssqlUsername":{"type":"string","description":"MS SQL Server user\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMssqlId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerMssql resources.\n","properties":{"mssqlCreateStatements":{"type":"string","description":"MSSQL Server Creation Statements\n"},"mssqlDbname":{"type":"string","description":"MSSQL Server DB Name\n"},"mssqlHost":{"type":"string","description":"MS SQL Server host name\n"},"mssqlPassword":{"type":"string","description":"MS SQL Server password\n"},"mssqlPort":{"type":"string","description":"MS SQL Server port\n"},"mssqlRevocationStatements":{"type":"string","description":"MSSQL Server Revocation Statements\n"},"mssqlUsername":{"type":"string","description":"MS SQL Server user\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMssqlId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerMysql:ProducerMysql":{"description":"MySQL producer resource\n","properties":{"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"mysqlDbname":{"type":"string","description":"MySQL DB name\n"},"mysqlHost":{"type":"string","description":"MySQL host name\n"},"mysqlPassword":{"type":"string","description":"MySQL password\n","secret":true},"mysqlPort":{"type":"string","description":"MySQL port\n"},"mysqlScreationStatements":{"type":"string","description":"MySQL Creation Statements\n"},"mysqlUsername":{"type":"string","description":"MySQL user\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMysqlId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["mysqlScreationStatements","name","producerMysqlId","secureAccessDbName"],"inputProperties":{"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"mysqlDbname":{"type":"string","description":"MySQL DB name\n"},"mysqlHost":{"type":"string","description":"MySQL host name\n"},"mysqlPassword":{"type":"string","description":"MySQL password\n","secret":true},"mysqlPort":{"type":"string","description":"MySQL port\n"},"mysqlScreationStatements":{"type":"string","description":"MySQL Creation Statements\n"},"mysqlUsername":{"type":"string","description":"MySQL user\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMysqlId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerMysql resources.\n","properties":{"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"mysqlDbname":{"type":"string","description":"MySQL DB name\n"},"mysqlHost":{"type":"string","description":"MySQL host name\n"},"mysqlPassword":{"type":"string","description":"MySQL password\n","secret":true},"mysqlPort":{"type":"string","description":"MySQL port\n"},"mysqlScreationStatements":{"type":"string","description":"MySQL Creation Statements\n"},"mysqlUsername":{"type":"string","description":"MySQL user\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerMysqlId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerOracle:ProducerOracle":{"description":"Oracle DB producer resource\n","properties":{"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"name":{"type":"string","description":"Producer name\n"},"oracleHost":{"type":"string","description":"Oracle host name\n"},"oraclePassword":{"type":"string","description":"Oracle password\n"},"oraclePort":{"type":"string","description":"Oracle port\n"},"oracleScreationStatements":{"type":"string","description":"Oracle Creation Statements\n"},"oracleServiceName":{"type":"string","description":"Oracle service name\n"},"oracleUsername":{"type":"string","description":"Oracle user\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerOracleId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerOracleId"],"inputProperties":{"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"name":{"type":"string","description":"Producer name\n"},"oracleHost":{"type":"string","description":"Oracle host name\n"},"oraclePassword":{"type":"string","description":"Oracle password\n"},"oraclePort":{"type":"string","description":"Oracle port\n"},"oracleScreationStatements":{"type":"string","description":"Oracle Creation Statements\n"},"oracleServiceName":{"type":"string","description":"Oracle service name\n"},"oracleUsername":{"type":"string","description":"Oracle user\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerOracleId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerOracle resources.\n","properties":{"dbServerCertificates":{"type":"string","description":"the set of root certificate authorities in base64 encoding that clients use when verifying server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"name":{"type":"string","description":"Producer name\n"},"oracleHost":{"type":"string","description":"Oracle host name\n"},"oraclePassword":{"type":"string","description":"Oracle password\n"},"oraclePort":{"type":"string","description":"Oracle port\n"},"oracleScreationStatements":{"type":"string","description":"Oracle Creation Statements\n"},"oracleServiceName":{"type":"string","description":"Oracle service name\n"},"oracleUsername":{"type":"string","description":"Oracle user\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerOracleId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerPostgres:ProducerPostgres":{"description":"PostgreSQLproducer resource\n","properties":{"creationStatements":{"type":"string","description":"PostgreSQL Creation Statements\n"},"name":{"type":"string","description":"Producer name\n"},"postgresqlDbName":{"type":"string","description":"PostgreSQL DB name\n"},"postgresqlHost":{"type":"string","description":"PostgreSQL host name\n"},"postgresqlPassword":{"type":"string","description":"PostgreSQL password\n"},"postgresqlPort":{"type":"string","description":"PostgreSQL port\n"},"postgresqlUsername":{"type":"string","description":"PostgreSQL user\n"},"producerEncryptionKey":{"type":"string","description":"Encrypt producer with following key\n"},"producerPostgresId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerPostgresId","secureAccessDbName"],"inputProperties":{"creationStatements":{"type":"string","description":"PostgreSQL Creation Statements\n"},"name":{"type":"string","description":"Producer name\n"},"postgresqlDbName":{"type":"string","description":"PostgreSQL DB name\n"},"postgresqlHost":{"type":"string","description":"PostgreSQL host name\n"},"postgresqlPassword":{"type":"string","description":"PostgreSQL password\n"},"postgresqlPort":{"type":"string","description":"PostgreSQL port\n"},"postgresqlUsername":{"type":"string","description":"PostgreSQL user\n"},"producerEncryptionKey":{"type":"string","description":"Encrypt producer with following key\n"},"producerPostgresId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerPostgres resources.\n","properties":{"creationStatements":{"type":"string","description":"PostgreSQL Creation Statements\n"},"name":{"type":"string","description":"Producer name\n"},"postgresqlDbName":{"type":"string","description":"PostgreSQL DB name\n"},"postgresqlHost":{"type":"string","description":"PostgreSQL host name\n"},"postgresqlPassword":{"type":"string","description":"PostgreSQL password\n"},"postgresqlPort":{"type":"string","description":"PostgreSQL port\n"},"postgresqlUsername":{"type":"string","description":"PostgreSQL user\n"},"producerEncryptionKey":{"type":"string","description":"Encrypt producer with following key\n"},"producerPostgresId":{"type":"string","description":"The ID of this resource.\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Bastion\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessDbSchema":{"type":"string","description":"The db schema\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerRdp:ProducerRdp":{"description":"RDP Producer resource\n","properties":{"fixedUserOnly":{"type":"string","description":"Enable fixed user only\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerRdpId":{"type":"string","description":"The ID of this resource.\n"},"rdpAdminName":{"type":"string","description":"RDP Admin name\n"},"rdpAdminPwd":{"type":"string","description":"RDP Admin Password\n"},"rdpHostName":{"type":"string","description":"RDP Host name\n"},"rdpHostPort":{"type":"string","description":"RDP Host port\n"},"rdpUserGroups":{"type":"string","description":"RDP UserGroup name(s). Multiple values should be separated by comma\n"},"secureAccessAllowExternalUser":{"type":"boolean","description":"Allow providing external user for a domain users\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessRdpDomain":{"type":"string","description":"Required when the Dynamic Secret is used for a domain user\n"},"secureAccessRdpUser":{"type":"string","description":"Override the RDP Domain username\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerRdpId","secureAccessWeb"],"inputProperties":{"fixedUserOnly":{"type":"string","description":"Enable fixed user only\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerRdpId":{"type":"string","description":"The ID of this resource.\n"},"rdpAdminName":{"type":"string","description":"RDP Admin name\n"},"rdpAdminPwd":{"type":"string","description":"RDP Admin Password\n"},"rdpHostName":{"type":"string","description":"RDP Host name\n"},"rdpHostPort":{"type":"string","description":"RDP Host port\n"},"rdpUserGroups":{"type":"string","description":"RDP UserGroup name(s). Multiple values should be separated by comma\n"},"secureAccessAllowExternalUser":{"type":"boolean","description":"Allow providing external user for a domain users\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessRdpDomain":{"type":"string","description":"Required when the Dynamic Secret is used for a domain user\n"},"secureAccessRdpUser":{"type":"string","description":"Override the RDP Domain username\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerRdp resources.\n","properties":{"fixedUserOnly":{"type":"string","description":"Enable fixed user only\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKeyName":{"type":"string","description":"Encrypt producer with following key\n"},"producerRdpId":{"type":"string","description":"The ID of this resource.\n"},"rdpAdminName":{"type":"string","description":"RDP Admin name\n"},"rdpAdminPwd":{"type":"string","description":"RDP Admin Password\n"},"rdpHostName":{"type":"string","description":"RDP Host name\n"},"rdpHostPort":{"type":"string","description":"RDP Host port\n"},"rdpUserGroups":{"type":"string","description":"RDP UserGroup name(s). Multiple values should be separated by comma\n"},"secureAccessAllowExternalUser":{"type":"boolean","description":"Allow providing external user for a domain users\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessRdpDomain":{"type":"string","description":"Required when the Dynamic Secret is used for a domain user\n"},"secureAccessRdpUser":{"type":"string","description":"Override the RDP Domain username\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/producerRedshift:ProducerRedshift":{"description":"Redshift producer resource\n","properties":{"creationStatements":{"type":"string","description":"Redshift Creation Statements\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKey":{"type":"string","description":"Encrypt producer with following key\n"},"producerRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"redshiftDbName":{"type":"string","description":"Redshift DB name\n"},"redshiftHost":{"type":"string","description":"Redshift host name\n"},"redshiftPassword":{"type":"string","description":"Redshift password\n"},"redshiftPort":{"type":"string","description":"Redshift port\n"},"redshiftUsername":{"type":"string","description":"redshiftL user\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object","required":["name","producerRedshiftId","secureAccessDbName","secureAccessWeb"],"inputProperties":{"creationStatements":{"type":"string","description":"Redshift Creation Statements\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKey":{"type":"string","description":"Encrypt producer with following key\n"},"producerRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"redshiftDbName":{"type":"string","description":"Redshift DB name\n"},"redshiftHost":{"type":"string","description":"Redshift host name\n"},"redshiftPassword":{"type":"string","description":"Redshift password\n"},"redshiftPort":{"type":"string","description":"Redshift port\n"},"redshiftUsername":{"type":"string","description":"redshiftL user\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering ProducerRedshift resources.\n","properties":{"creationStatements":{"type":"string","description":"Redshift Creation Statements\n"},"name":{"type":"string","description":"Producer name\n"},"producerEncryptionKey":{"type":"string","description":"Encrypt producer with following key\n"},"producerRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"redshiftDbName":{"type":"string","description":"Redshift DB name\n"},"redshiftHost":{"type":"string","description":"Redshift host name\n"},"redshiftPassword":{"type":"string","description":"Redshift password\n"},"redshiftPort":{"type":"string","description":"Redshift port\n"},"redshiftUsername":{"type":"string","description":"redshiftL user\n"},"secureAccessDbName":{"type":"string","description":"Enable Web Secure Remote Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target DB servers for connections., For multiple values repeat this flag.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"Name of existing target to use in producer creation\n"},"userTtl":{"type":"string","description":"User TTL\n"}},"type":"object"}},"akeyless:index/role:Role":{"description":"Role Resource\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as akeyless from \"@pulumi/akeyless\";\n\nexport = async () =\u003e {\n    const apiKey = new akeyless.AuthMethod(\"api_key\", {\n        apiKeys: [{}],\n        path: \"auth-method-api-key-demo\",\n    });\n    const role = new akeyless.Role(\"role\", {\n        name: \"demo-role\",\n        assocAuthMethods: [{\n            amName: \"auth-method-api-key-demo\",\n            subClaims: {\n                groups: \"developers,readers\",\n                users: \"bob\",\n            },\n        }],\n        rules: [{\n            capabilities: [\"read\"],\n            path: \"/*\",\n            ruleType: \"auth-method-rule\",\n        }],\n    }, {\n        dependsOn: [apiKey],\n    });\n    const demo_role = akeyless.getRoleOutput({\n        name: role.roleId,\n    });\n    return {\n        \"demo-role\": demo_role,\n    };\n}\n```\n```python\nimport pulumi\nimport pulumi_akeyless as akeyless\n\napi_key = akeyless.AuthMethod(\"api_key\",\n    api_keys=[{}],\n    path=\"auth-method-api-key-demo\")\nrole = akeyless.Role(\"role\",\n    name=\"demo-role\",\n    assoc_auth_methods=[{\n        \"am_name\": \"auth-method-api-key-demo\",\n        \"sub_claims\": {\n            \"groups\": \"developers,readers\",\n            \"users\": \"bob\",\n        },\n    }],\n    rules=[{\n        \"capabilities\": [\"read\"],\n        \"path\": \"/*\",\n        \"rule_type\": \"auth-method-rule\",\n    }],\n    opts = pulumi.ResourceOptions(depends_on=[api_key]))\ndemo_role = akeyless.get_role_output(name=role.role_id)\npulumi.export(\"demo-role\", demo_role)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Akeyless = Pulumi.Akeyless;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var apiKey = new Akeyless.AuthMethod(\"api_key\", new()\n    {\n        ApiKeys = new[]\n        {\n            null,\n        },\n        Path = \"auth-method-api-key-demo\",\n    });\n\n    var role = new Akeyless.Role(\"role\", new()\n    {\n        Name = \"demo-role\",\n        AssocAuthMethods = new[]\n        {\n            new Akeyless.Inputs.RoleAssocAuthMethodArgs\n            {\n                AmName = \"auth-method-api-key-demo\",\n                SubClaims = \n                {\n                    { \"groups\", \"developers,readers\" },\n                    { \"users\", \"bob\" },\n                },\n            },\n        },\n        Rules = new[]\n        {\n            new Akeyless.Inputs.RoleRuleArgs\n            {\n                Capabilities = new[]\n                {\n                    \"read\",\n                },\n                Path = \"/*\",\n                RuleType = \"auth-method-rule\",\n            },\n        },\n    }, new CustomResourceOptions\n    {\n        DependsOn =\n        {\n            apiKey,\n        },\n    });\n\n    var demo_role = Akeyless.GetRole.Invoke(new()\n    {\n        Name = role.RoleId,\n    });\n\n    return new Dictionary\u003cstring, object?\u003e\n    {\n        [\"demo-role\"] = demo_role,\n    };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tapiKey, err := akeyless.NewAuthMethod(ctx, \"api_key\", \u0026akeyless.AuthMethodArgs{\n\t\t\tApiKeys: akeyless.AuthMethodApiKeyTypeArray{\n\t\t\t\t\u0026akeyless.AuthMethodApiKeyTypeArgs{},\n\t\t\t},\n\t\t\tPath: pulumi.String(\"auth-method-api-key-demo\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trole, err := akeyless.NewRole(ctx, \"role\", \u0026akeyless.RoleArgs{\n\t\t\tName: pulumi.String(\"demo-role\"),\n\t\t\tAssocAuthMethods: akeyless.RoleAssocAuthMethodArray{\n\t\t\t\t\u0026akeyless.RoleAssocAuthMethodArgs{\n\t\t\t\t\tAmName: pulumi.String(\"auth-method-api-key-demo\"),\n\t\t\t\t\tSubClaims: pulumi.StringMap{\n\t\t\t\t\t\t\"groups\": pulumi.String(\"developers,readers\"),\n\t\t\t\t\t\t\"users\":  pulumi.String(\"bob\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tRules: akeyless.RoleRuleArray{\n\t\t\t\t\u0026akeyless.RoleRuleArgs{\n\t\t\t\t\tCapabilities: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"read\"),\n\t\t\t\t\t},\n\t\t\t\t\tPath:     pulumi.String(\"/*\"),\n\t\t\t\t\tRuleType: pulumi.String(\"auth-method-rule\"),\n\t\t\t\t},\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tapiKey,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdemo_role := akeyless.LookupRoleOutput(ctx, akeyless.GetRoleOutputArgs{\n\t\t\tName: role.RoleId,\n\t\t}, nil)\n\t\tctx.Export(\"demo-role\", demo_role)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.akeyless.AuthMethod;\nimport com.pulumi.akeyless.AuthMethodArgs;\nimport com.pulumi.akeyless.inputs.AuthMethodApiKeyArgs;\nimport com.pulumi.akeyless.Role;\nimport com.pulumi.akeyless.RoleArgs;\nimport com.pulumi.akeyless.inputs.RoleAssocAuthMethodArgs;\nimport com.pulumi.akeyless.inputs.RoleRuleArgs;\nimport com.pulumi.akeyless.AkeylessFunctions;\nimport com.pulumi.akeyless.inputs.GetRoleArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var apiKey = new AuthMethod(\"apiKey\", AuthMethodArgs.builder()\n            .apiKeys(AuthMethodApiKeyArgs.builder()\n                .build())\n            .path(\"auth-method-api-key-demo\")\n            .build());\n\n        var role = new Role(\"role\", RoleArgs.builder()\n            .name(\"demo-role\")\n            .assocAuthMethods(RoleAssocAuthMethodArgs.builder()\n                .amName(\"auth-method-api-key-demo\")\n                .subClaims(Map.ofEntries(\n                    Map.entry(\"groups\", \"developers,readers\"),\n                    Map.entry(\"users\", \"bob\")\n                ))\n                .build())\n            .rules(RoleRuleArgs.builder()\n                .capabilities(\"read\")\n                .path(\"/*\")\n                .ruleType(\"auth-method-rule\")\n                .build())\n            .build(), CustomResourceOptions.builder()\n                .dependsOn(apiKey)\n                .build());\n\n        final var demo-role = AkeylessFunctions.getRole(GetRoleArgs.builder()\n            .name(role.roleId())\n            .build());\n\n        ctx.export(\"demo-role\", demo_role);\n    }\n}\n```\n```yaml\nresources:\n  apiKey:\n    type: akeyless:AuthMethod\n    name: api_key\n    properties:\n      apiKeys:\n        - {}\n      path: auth-method-api-key-demo\n  role:\n    type: akeyless:Role\n    properties:\n      name: demo-role\n      assocAuthMethods:\n        - amName: auth-method-api-key-demo\n          subClaims:\n            groups: developers,readers\n            users: bob\n      rules:\n        - capabilities:\n            - read\n          path: /*\n          ruleType: auth-method-rule\n    options:\n      dependsOn:\n        - ${apiKey}\nvariables:\n  demo-role:\n    fn::invoke:\n      function: akeyless:getRole\n      arguments:\n        name: ${role.roleId}\noutputs:\n  demo-role: ${[\"demo-role\"]}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import akeyless:index/role:Role example /full-role-path/and-name-in-akeyless\n```\n\n","properties":{"analyticsAccess":{"type":"string","description":"Allow this role to view analytics. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods.\n"},"assocAuthMethods":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleAssocAuthMethod:RoleAssocAuthMethod"},"description":"Create an association between role and auth method\n","deprecationMessage":"Deprecated"},"auditAccess":{"type":"string","description":"Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this role, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"eventCenterAccess":{"type":"string","description":"Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported.\n"},"eventForwardersAccess":{"type":"string","description":"Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported.\n"},"gwAnalyticsAccess":{"type":"string","description":"Allow this role to view gw analytics. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods.\n"},"name":{"type":"string","description":"Role name\n"},"restrictedRules":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleRestrictedRule:RoleRestrictedRule"}},"roleId":{"type":"string","description":"The ID of this resource.\n"},"rules":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleRule:RoleRule"},"description":"Set a rule to a role\n"},"sraReportsAccess":{"type":"string","description":"Allow this role to view SRA Clusters. Currently only 'none', 'own' and 'all' values are supported.\n"},"usageReportsAccess":{"type":"string","description":"Allow this role to view Usage reports. Currently only 'none' and 'all' values are supported.\n"}},"type":"object","required":["name","restrictedRules","roleId"],"inputProperties":{"analyticsAccess":{"type":"string","description":"Allow this role to view analytics. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods.\n"},"assocAuthMethods":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleAssocAuthMethod:RoleAssocAuthMethod"},"description":"Create an association between role and auth method\n","deprecationMessage":"Deprecated"},"auditAccess":{"type":"string","description":"Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this role, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"eventCenterAccess":{"type":"string","description":"Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported.\n"},"eventForwardersAccess":{"type":"string","description":"Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported.\n"},"gwAnalyticsAccess":{"type":"string","description":"Allow this role to view gw analytics. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods.\n"},"name":{"type":"string","description":"Role name\n"},"roleId":{"type":"string","description":"The ID of this resource.\n"},"rules":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleRule:RoleRule"},"description":"Set a rule to a role\n"},"sraReportsAccess":{"type":"string","description":"Allow this role to view SRA Clusters. Currently only 'none', 'own' and 'all' values are supported.\n"},"usageReportsAccess":{"type":"string","description":"Allow this role to view Usage reports. Currently only 'none' and 'all' values are supported.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering Role resources.\n","properties":{"analyticsAccess":{"type":"string","description":"Allow this role to view analytics. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods.\n"},"assocAuthMethods":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleAssocAuthMethod:RoleAssocAuthMethod"},"description":"Create an association between role and auth method\n","deprecationMessage":"Deprecated"},"auditAccess":{"type":"string","description":"Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods.\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this role, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"eventCenterAccess":{"type":"string","description":"Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported.\n"},"eventForwardersAccess":{"type":"string","description":"Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported.\n"},"gwAnalyticsAccess":{"type":"string","description":"Allow this role to view gw analytics. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods.\n"},"name":{"type":"string","description":"Role name\n"},"restrictedRules":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleRestrictedRule:RoleRestrictedRule"}},"roleId":{"type":"string","description":"The ID of this resource.\n"},"rules":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FRoleRule:RoleRule"},"description":"Set a rule to a role\n"},"sraReportsAccess":{"type":"string","description":"Allow this role to view SRA Clusters. Currently only 'none', 'own' and 'all' values are supported.\n"},"usageReportsAccess":{"type":"string","description":"Allow this role to view Usage reports. Currently only 'none' and 'all' values are supported.\n"}},"type":"object"}},"akeyless:index/rotatedSecret:RotatedSecret":{"description":"Rotated secret resource\n","properties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with use-user-creds/use-target-creds\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"customPayload":{"type":"string","description":"Secret payload to be sent with rotation request (relevant only for rotator-type=custom)\n"},"description":{"type":"string","description":"Description of the object\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorCustomCmd":{"type":"string","description":"Custom rotation command (relevant only for ssh target)\n"},"rotatorType":{"type":"string","description":"The rotator type password/target/api-key/ldap/custom\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"userAttribute":{"type":"string","description":"LDAP User Attribute\n"},"userDn":{"type":"string","description":"Base DN to Perform User Search\n"}},"type":"object","required":["apiId","apiKey","customPayload","name","rotatedPassword","rotatedSecretId","rotatedUsername","rotatorType","targetName","userAttribute","userDn"],"inputProperties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with use-user-creds/use-target-creds\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"customPayload":{"type":"string","description":"Secret payload to be sent with rotation request (relevant only for rotator-type=custom)\n"},"description":{"type":"string","description":"Description of the object\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorCustomCmd":{"type":"string","description":"Custom rotation command (relevant only for ssh target)\n"},"rotatorType":{"type":"string","description":"The rotator type password/target/api-key/ldap/custom\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"userAttribute":{"type":"string","description":"LDAP User Attribute\n"},"userDn":{"type":"string","description":"Base DN to Perform User Search\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecret resources.\n","properties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with use-user-creds/use-target-creds\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"customPayload":{"type":"string","description":"Secret payload to be sent with rotation request (relevant only for rotator-type=custom)\n"},"description":{"type":"string","description":"Description of the object\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorCustomCmd":{"type":"string","description":"Custom rotation command (relevant only for ssh target)\n"},"rotatorType":{"type":"string","description":"The rotator type password/target/api-key/ldap/custom\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"userAttribute":{"type":"string","description":"LDAP User Attribute\n"},"userDn":{"type":"string","description":"Base DN to Perform User Search\n"}},"type":"object"}},"akeyless:index/rotatedSecretAws:RotatedSecretAws":{"description":"Aws rotated secret resource\n","properties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"graceRotation":{"type":"string","description":"Create a new access key without deleting the old key from AWS for backup (relevant only for AWS) [true/false]\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretAwsId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/api-key]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["apiId","apiKey","key","name","rotatedSecretAwsId","rotatorType","targetName"],"inputProperties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"graceRotation":{"type":"string","description":"Create a new access key without deleting the old key from AWS for backup (relevant only for AWS) [true/false]\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretAwsId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/api-key]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretAws resources.\n","properties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"graceRotation":{"type":"string","description":"Create a new access key without deleting the old key from AWS for backup (relevant only for AWS) [true/false]\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretAwsId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/api-key]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretAzure:RotatedSecretAzure":{"description":"Azure rotated secret resource\n","properties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"appId":{"type":"string","description":"Id of the azure app that hold the serect to be rotated (relevant only for rotator-type=api-key \u0026 authentication-credentials=use-target-creds)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretAzureId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password/api-key/azure-storage-account]\n"},"storageAccountKeyName":{"type":"string","description":"The name of the storage account key to rotate key1/key2/kerb1/kerb2\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"username":{"type":"string","description":"The user principal name to rotate his password (relevant only for rotator-type=password)\n"}},"type":"object","required":["apiId","apiKey","key","name","rotatedSecretAzureId","rotatorType","targetName"],"inputProperties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"appId":{"type":"string","description":"Id of the azure app that hold the serect to be rotated (relevant only for rotator-type=api-key \u0026 authentication-credentials=use-target-creds)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretAzureId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password/api-key/azure-storage-account]\n"},"storageAccountKeyName":{"type":"string","description":"The name of the storage account key to rotate key1/key2/kerb1/kerb2\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"username":{"type":"string","description":"The user principal name to rotate his password (relevant only for rotator-type=password)\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretAzure resources.\n","properties":{"apiId":{"type":"string","description":"API ID to rotate (relevant only for rotator-type=api-key)\n"},"apiKey":{"type":"string","description":"API key to rotate (relevant only for rotator-type=api-key)\n"},"appId":{"type":"string","description":"Id of the azure app that hold the serect to be rotated (relevant only for rotator-type=api-key \u0026 authentication-credentials=use-target-creds)\n"},"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretAzureId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password/api-key/azure-storage-account]\n"},"storageAccountKeyName":{"type":"string","description":"The name of the storage account key to rotate key1/key2/kerb1/kerb2\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"username":{"type":"string","description":"The user principal name to rotate his password (relevant only for rotator-type=password)\n"}},"type":"object"}},"akeyless:index/rotatedSecretCassandra:RotatedSecretCassandra":{"description":"Cassandra rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretCassandraId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretCassandraId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretCassandraId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretCassandra resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretCassandraId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretCustom:RotatedSecretCustom":{"description":"Custom rotated secret resource\n","properties":{"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"customPayload":{"type":"string","description":"Secret payload to be sent with rotation request\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretCustomId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["customPayload","key","name","rotatedSecretCustomId","targetName"],"inputProperties":{"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"customPayload":{"type":"string","description":"Secret payload to be sent with rotation request\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretCustomId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretCustom resources.\n","properties":{"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"customPayload":{"type":"string","description":"Secret payload to be sent with rotation request\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretCustomId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretDockerhub:RotatedSecretDockerhub":{"description":"Dockerhub rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretDockerhubId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedSecretDockerhubId","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretDockerhubId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretDockerhub resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretDockerhubId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretGcp:RotatedSecretGcp":{"description":"Gcp rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpServiceAccountEmail":{"type":"string","description":"The email of the gcp service account to rotate (relevant only when rotator-type=servcie-account-rotator)\n"},"gcpServiceAccountKeyId":{"type":"string","description":"The key id of the gcp service account to rotate (relevant only when rotator-type=servcie-account-rotator)\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretGcpId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/service-account-rotator]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["gcpKey","key","name","rotatedSecretGcpId","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpServiceAccountEmail":{"type":"string","description":"The email of the gcp service account to rotate (relevant only when rotator-type=servcie-account-rotator)\n"},"gcpServiceAccountKeyId":{"type":"string","description":"The key id of the gcp service account to rotate (relevant only when rotator-type=servcie-account-rotator)\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretGcpId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/service-account-rotator]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretGcp resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n"},"gcpServiceAccountEmail":{"type":"string","description":"The email of the gcp service account to rotate (relevant only when rotator-type=servcie-account-rotator)\n"},"gcpServiceAccountKeyId":{"type":"string","description":"The key id of the gcp service account to rotate (relevant only when rotator-type=servcie-account-rotator)\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedSecretGcpId":{"type":"string","description":"The ID of this resource.\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/service-account-rotator]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretHanadb:RotatedSecretHanadb":{"description":"Hanadb rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretHanadbId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretHanadbId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretHanadbId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretHanadb resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretHanadbId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretLdap:RotatedSecretLdap":{"description":"Ldap rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretLdapId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/ldap]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"userAttribute":{"type":"string","description":"LDAP User Attribute\n"},"userDn":{"type":"string","description":"Base DN to Perform User Search\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretLdapId","rotatedUsername","rotatorType","targetName","userAttribute","userDn"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretLdapId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/ldap]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"userAttribute":{"type":"string","description":"LDAP User Attribute\n"},"userDn":{"type":"string","description":"Base DN to Perform User Search\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretLdap resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretLdapId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/ldap]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"},"userAttribute":{"type":"string","description":"LDAP User Attribute\n"},"userDn":{"type":"string","description":"Base DN to Perform User Search\n"}},"type":"object"}},"akeyless:index/rotatedSecretMongodb:RotatedSecretMongodb":{"description":"Mongodb rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMongodbId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretMongodbId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMongodbId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretMongodb resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMongodbId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretMssql:RotatedSecretMssql":{"description":"Mssql rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMssqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretMssqlId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMssqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretMssql resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMssqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretMysql:RotatedSecretMysql":{"description":"Mysql rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every\u003cspan pulumi-lang-nodejs=\" rotationInterval \" pulumi-lang-dotnet=\" RotationInterval \" pulumi-lang-go=\" rotationInterval \" pulumi-lang-python=\" rotation_interval \" pulumi-lang-yaml=\" rotationInterval \" pulumi-lang-java=\" rotationInterval \"\u003e rotation_interval \u003c/span\u003edays, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMysqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretMysqlId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every\u003cspan pulumi-lang-nodejs=\" rotationInterval \" pulumi-lang-dotnet=\" RotationInterval \" pulumi-lang-go=\" rotationInterval \" pulumi-lang-python=\" rotation_interval \" pulumi-lang-yaml=\" rotationInterval \" pulumi-lang-java=\" rotationInterval \"\u003e rotation_interval \u003c/span\u003edays, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMysqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretMysql resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every\u003cspan pulumi-lang-nodejs=\" rotationInterval \" pulumi-lang-dotnet=\" RotationInterval \" pulumi-lang-go=\" rotationInterval \" pulumi-lang-python=\" rotation_interval \" pulumi-lang-yaml=\" rotationInterval \" pulumi-lang-java=\" rotationInterval \"\u003e rotation_interval \u003c/span\u003edays, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretMysqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretOracle:RotatedSecretOracle":{"description":"Oracle rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretOracleId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretOracleId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretOracleId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretOracle resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretOracleId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretPostgresql:RotatedSecretPostgresql":{"description":"Postgresql rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretPostgresqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretPostgresqlId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretPostgresqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretPostgresql resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretPostgresqlId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretRedis:RotatedSecretRedis":{"description":"Redis rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretRedisId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretRedisId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretRedisId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretRedis resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretRedisId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretRedshift:RotatedSecretRedshift":{"description":"Redshift rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretRedshiftId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretRedshift resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretRedshiftId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretSnowflake:RotatedSecretSnowflake":{"description":"Snowflake rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretSnowflakeId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretSnowflakeId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretSnowflakeId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretSnowflake resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretSnowflakeId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretSsh:RotatedSecretSsh":{"description":"Ssh rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretSshId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorCustomCmd":{"type":"string","description":"Custom rotation command\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretSshId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretSshId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorCustomCmd":{"type":"string","description":"Custom rotation command\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretSsh resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretSshId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorCustomCmd":{"type":"string","description":"Custom rotation command\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/rotatedSecretSync:RotatedSecretSync":{"description":"Sync Rotated Secret with Universal Secrets Connector resource\n","properties":{"filterSecretValue":{"type":"string","description":"JQ expression to filter or transform the secret value\n"},"name":{"type":"string","description":"Rotated Secret name\n"},"namespace":{"type":"string"},"remoteSecretName":{"type":"string","description":"Remote Secret Name that will be synced on the remote endpoint\n"},"rotatedSecretSyncId":{"type":"string","description":"The ID of this resource.\n"},"uscName":{"type":"string","description":"Universal Secret Connector name\n"}},"type":"object","required":["name","remoteSecretName","rotatedSecretSyncId","uscName"],"inputProperties":{"filterSecretValue":{"type":"string","description":"JQ expression to filter or transform the secret value\n"},"name":{"type":"string","description":"Rotated Secret name\n"},"namespace":{"type":"string"},"remoteSecretName":{"type":"string","description":"Remote Secret Name that will be synced on the remote endpoint\n"},"rotatedSecretSyncId":{"type":"string","description":"The ID of this resource.\n"},"uscName":{"type":"string","description":"Universal Secret Connector name\n"}},"requiredInputs":["remoteSecretName","uscName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretSync resources.\n","properties":{"filterSecretValue":{"type":"string","description":"JQ expression to filter or transform the secret value\n"},"name":{"type":"string","description":"Rotated Secret name\n"},"namespace":{"type":"string"},"remoteSecretName":{"type":"string","description":"Remote Secret Name that will be synced on the remote endpoint\n"},"rotatedSecretSyncId":{"type":"string","description":"The ID of this resource.\n"},"uscName":{"type":"string","description":"Universal Secret Connector name\n"}},"type":"object"}},"akeyless:index/rotatedSecretWindows:RotatedSecretWindows":{"description":"Windows rotated secret resource\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretWindowsId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object","required":["key","name","rotatedPassword","rotatedSecretWindowsId","rotatedUsername","rotatorType","targetName"],"inputProperties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretWindowsId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"requiredInputs":["rotatorType","targetName"],"stateInputs":{"description":"Input properties used for looking up and filtering RotatedSecretWindows resources.\n","properties":{"authenticationCredentials":{"type":"string","description":"The credentials to connect with [use-self-creds/use-target-creds]\n"},"autoRotate":{"type":"string","description":"Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Secret name\n"},"passwordLength":{"type":"string","description":"The length of the password to be generated\n"},"rotatedPassword":{"type":"string","description":"rotated-username password (relevant only for rotator-type=password)\n"},"rotatedSecretWindowsId":{"type":"string","description":"The ID of this resource.\n"},"rotatedUsername":{"type":"string","description":"username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password)\n"},"rotationHour":{"type":"number","description":"The Hour of the rotation in UTC\n"},"rotationInterval":{"type":"string","description":"The number of days to wait between every automatic rotation (1-365),custom rotator interval will be set in minutes\n"},"rotatorType":{"type":"string","description":"The rotator type [target/password]\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"targetName":{"type":"string","description":"The target name to associate\n"}},"type":"object"}},"akeyless:index/sshCertIssuer:SshCertIssuer":{"description":"SSH Cert Issuer  resource\n","properties":{"allowedUsers":{"type":"string","description":"Users allowed to fetch the certificate, e.g root,ubuntu\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"extensions":{"type":"object","additionalProperties":{"type":"string"},"description":"Signed certificates with extensions (key/val), e.g permit-port-forwarding=\n"},"name":{"type":"string","description":"SSH certificate issuer name\n"},"principals":{"type":"string","description":"Signed certificates with principal, e.g example*role1,example*role2\n"},"secureAccessBastionApi":{"type":"string","description":"Bastion's SSH control API endpoint. E.g. https://my.bastion:9900\n"},"secureAccessBastionSsh":{"type":"string","description":"Bastion's SSH server. E.g. my.bastion:22\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections. (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)\n"},"secureAccessSshCredsUser":{"type":"string","description":"SSH username to connect to target server, must be in 'Allowed Users' list\n"},"secureAccessUseInternalBastion":{"type":"boolean","description":"Use internal SSH Bastion\n"},"signerKeyName":{"type":"string","description":"A key to sign the certificate with\n"},"sshCertIssuerId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"ttl":{"type":"number","description":"The requested Time To Live for the certificate, in seconds\n"}},"type":"object","required":["allowedUsers","name","signerKeyName","sshCertIssuerId","ttl"],"inputProperties":{"allowedUsers":{"type":"string","description":"Users allowed to fetch the certificate, e.g root,ubuntu\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"extensions":{"type":"object","additionalProperties":{"type":"string"},"description":"Signed certificates with extensions (key/val), e.g permit-port-forwarding=\n"},"name":{"type":"string","description":"SSH certificate issuer name\n"},"principals":{"type":"string","description":"Signed certificates with principal, e.g example*role1,example*role2\n"},"secureAccessBastionApi":{"type":"string","description":"Bastion's SSH control API endpoint. E.g. https://my.bastion:9900\n"},"secureAccessBastionSsh":{"type":"string","description":"Bastion's SSH server. E.g. my.bastion:22\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections. (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)\n"},"secureAccessSshCredsUser":{"type":"string","description":"SSH username to connect to target server, must be in 'Allowed Users' list\n"},"secureAccessUseInternalBastion":{"type":"boolean","description":"Use internal SSH Bastion\n"},"signerKeyName":{"type":"string","description":"A key to sign the certificate with\n"},"sshCertIssuerId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"ttl":{"type":"number","description":"The requested Time To Live for the certificate, in seconds\n"}},"requiredInputs":["allowedUsers","signerKeyName","ttl"],"stateInputs":{"description":"Input properties used for looking up and filtering SshCertIssuer resources.\n","properties":{"allowedUsers":{"type":"string","description":"Users allowed to fetch the certificate, e.g root,ubuntu\n"},"deleteProtection":{"type":"boolean","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"extensions":{"type":"object","additionalProperties":{"type":"string"},"description":"Signed certificates with extensions (key/val), e.g permit-port-forwarding=\n"},"name":{"type":"string","description":"SSH certificate issuer name\n"},"principals":{"type":"string","description":"Signed certificates with principal, e.g example*role1,example*role2\n"},"secureAccessBastionApi":{"type":"string","description":"Bastion's SSH control API endpoint. E.g. https://my.bastion:9900\n"},"secureAccessBastionSsh":{"type":"string","description":"Bastion's SSH server. E.g. my.bastion:22\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections. (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)\n"},"secureAccessSshCredsUser":{"type":"string","description":"SSH username to connect to target server, must be in 'Allowed Users' list\n"},"secureAccessUseInternalBastion":{"type":"boolean","description":"Use internal SSH Bastion\n"},"signerKeyName":{"type":"string","description":"A key to sign the certificate with\n"},"sshCertIssuerId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"ttl":{"type":"number","description":"The requested Time To Live for the certificate, in seconds\n"}},"type":"object"}},"akeyless:index/staticSecret:StaticSecret":{"description":"Static secret Resource\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as akeyless from \"@pulumi/akeyless\";\n\nconst secret = new akeyless.StaticSecret(\"secret\", {\n    path: \"terraform/secret\",\n    value: \"this value was set from terraform\",\n});\n```\n```python\nimport pulumi\nimport pulumi_akeyless as akeyless\n\nsecret = akeyless.StaticSecret(\"secret\",\n    path=\"terraform/secret\",\n    value=\"this value was set from terraform\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Akeyless = Pulumi.Akeyless;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var secret = new Akeyless.StaticSecret(\"secret\", new()\n    {\n        Path = \"terraform/secret\",\n        Value = \"this value was set from terraform\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := akeyless.NewStaticSecret(ctx, \"secret\", \u0026akeyless.StaticSecretArgs{\n\t\t\tPath:  pulumi.String(\"terraform/secret\"),\n\t\t\tValue: pulumi.String(\"this value was set from terraform\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.akeyless.StaticSecret;\nimport com.pulumi.akeyless.StaticSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var secret = new StaticSecret(\"secret\", StaticSecretArgs.builder()\n            .path(\"terraform/secret\")\n            .value(\"this value was set from terraform\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  secret:\n    type: akeyless:StaticSecret\n    properties:\n      path: terraform/secret\n      value: this value was set from terraform\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n```sh\n$ pulumi import akeyless:index/staticSecret:StaticSecret example /full-secret-path/and-name-in-akeyless\n```\n\n","properties":{"customField":{"type":"object","additionalProperties":{"type":"string"},"description":"Additional custom fields to associate with the item (e.g fieldName1=value1) (relevant only for type 'password')\n","secret":true},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"format":{"type":"string","description":"Secret format text/json/key-value\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"injectUrls":{"type":"array","items":{"type":"string"},"description":"List of URLs associated with the item (relevant only for type 'password')\n"},"keepPrevVersion":{"type":"string","description":"Whether to keep previous version [true/false]. If not set, use default according to account settings\n"},"multilineValue":{"type":"boolean","description":"The provided value is a multiline value (separated by '\n')\n"},"password":{"type":"string","description":"Password value (relevant only for type 'password')\n","secret":true},"path":{"type":"string","description":"The path where the secret will be stored.\n"},"protectionKey":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Secure Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessSshCreds":{"type":"string","description":"Static-Secret values contains SSH Credentials, either Private Key or Password [password/private-key]\n"},"secureAccessSshUser":{"type":"string","description":"Override the SSH username as indicated in SSH Certificate Issuer\n"},"secureAccessUrl":{"type":"string","description":"Destination URL to inject secrets.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless's Secure Remote Access (SRA)\n"},"staticSecretId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"type":{"type":"string","description":"Secret type [generic/password]\n"},"username":{"type":"string","description":"Username value (relevant only for type 'password')\n"},"value":{"type":"string","description":"The secret content.\n","secret":true},"version":{"type":"number","description":"The version of the secret.\n"}},"type":"object","required":["deleteProtection","path","protectionKey","secureAccessWeb","staticSecretId","version"],"inputProperties":{"customField":{"type":"object","additionalProperties":{"type":"string"},"description":"Additional custom fields to associate with the item (e.g fieldName1=value1) (relevant only for type 'password')\n","secret":true},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"format":{"type":"string","description":"Secret format text/json/key-value\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"injectUrls":{"type":"array","items":{"type":"string"},"description":"List of URLs associated with the item (relevant only for type 'password')\n"},"keepPrevVersion":{"type":"string","description":"Whether to keep previous version [true/false]. If not set, use default according to account settings\n"},"multilineValue":{"type":"boolean","description":"The provided value is a multiline value (separated by '\n')\n"},"password":{"type":"string","description":"Password value (relevant only for type 'password')\n","secret":true},"path":{"type":"string","description":"The path where the secret will be stored.\n"},"protectionKey":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Secure Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessSshCreds":{"type":"string","description":"Static-Secret values contains SSH Credentials, either Private Key or Password [password/private-key]\n"},"secureAccessSshUser":{"type":"string","description":"Override the SSH username as indicated in SSH Certificate Issuer\n"},"secureAccessUrl":{"type":"string","description":"Destination URL to inject secrets.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless's Secure Remote Access (SRA)\n"},"staticSecretId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"type":{"type":"string","description":"Secret type [generic/password]\n"},"username":{"type":"string","description":"Username value (relevant only for type 'password')\n"},"value":{"type":"string","description":"The secret content.\n","secret":true}},"requiredInputs":["path"],"stateInputs":{"description":"Input properties used for looking up and filtering StaticSecret resources.\n","properties":{"customField":{"type":"object","additionalProperties":{"type":"string"},"description":"Additional custom fields to associate with the item (e.g fieldName1=value1) (relevant only for type 'password')\n","secret":true},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this auth method, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"format":{"type":"string","description":"Secret format text/json/key-value\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"injectUrls":{"type":"array","items":{"type":"string"},"description":"List of URLs associated with the item (relevant only for type 'password')\n"},"keepPrevVersion":{"type":"string","description":"Whether to keep previous version [true/false]. If not set, use default according to account settings\n"},"multilineValue":{"type":"boolean","description":"The provided value is a multiline value (separated by '\n')\n"},"password":{"type":"string","description":"Password value (relevant only for type 'password')\n","secret":true},"path":{"type":"string","description":"The path where the secret will be stored.\n"},"protectionKey":{"type":"string","description":"The name of a key that is used to encrypt the secret value (if empty, the account default protectionKey key will be used)\n"},"secureAccessBastionIssuer":{"type":"string","description":"Path to the SSH Certificate Issuer for your Akeyless Secure Access\n"},"secureAccessEnable":{"type":"string","description":"Enable/Disable secure remote access, [true/false]\n"},"secureAccessHosts":{"type":"array","items":{"type":"string"},"description":"Target servers for connections., For multiple values repeat this flag.\n"},"secureAccessSshCreds":{"type":"string","description":"Static-Secret values contains SSH Credentials, either Private Key or Password [password/private-key]\n"},"secureAccessSshUser":{"type":"string","description":"Override the SSH username as indicated in SSH Certificate Issuer\n"},"secureAccessUrl":{"type":"string","description":"Destination URL to inject secrets.\n"},"secureAccessWeb":{"type":"boolean","description":"Enable Web Secure Remote Access\n"},"secureAccessWebBrowsing":{"type":"boolean","description":"Secure browser via Akeyless's Secure Remote Access (SRA)\n"},"staticSecretId":{"type":"string","description":"The ID of this resource.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2\n"},"type":{"type":"string","description":"Secret type [generic/password]\n"},"username":{"type":"string","description":"Username value (relevant only for type 'password')\n"},"value":{"type":"string","description":"The secret content.\n","secret":true},"version":{"type":"number","description":"The version of the secret.\n"}},"type":"object"}},"akeyless:index/staticSecretSync:StaticSecretSync":{"description":"Sync Static Secret with Universal Secrets Connector resource\n","properties":{"filterSecretValue":{"type":"string","description":"JQ expression to filter or transform the secret value\n"},"name":{"type":"string","description":"Static Secret name\n"},"namespace":{"type":"string"},"remoteSecretName":{"type":"string","description":"Remote Secret Name that will be synced on the remote endpoint\n"},"staticSecretSyncId":{"type":"string","description":"The ID of this resource.\n"},"uscName":{"type":"string","description":"Universal Secret Connector name\n"}},"type":"object","required":["name","remoteSecretName","staticSecretSyncId","uscName"],"inputProperties":{"filterSecretValue":{"type":"string","description":"JQ expression to filter or transform the secret value\n"},"name":{"type":"string","description":"Static Secret name\n"},"namespace":{"type":"string"},"remoteSecretName":{"type":"string","description":"Remote Secret Name that will be synced on the remote endpoint\n"},"staticSecretSyncId":{"type":"string","description":"The ID of this resource.\n"},"uscName":{"type":"string","description":"Universal Secret Connector name\n"}},"requiredInputs":["remoteSecretName","uscName"],"stateInputs":{"description":"Input properties used for looking up and filtering StaticSecretSync resources.\n","properties":{"filterSecretValue":{"type":"string","description":"JQ expression to filter or transform the secret value\n"},"name":{"type":"string","description":"Static Secret name\n"},"namespace":{"type":"string"},"remoteSecretName":{"type":"string","description":"Remote Secret Name that will be synced on the remote endpoint\n"},"staticSecretSyncId":{"type":"string","description":"The ID of this resource.\n"},"uscName":{"type":"string","description":"Universal Secret Connector name\n"}},"type":"object"}},"akeyless:index/targetArtifactory:TargetArtifactory":{"description":"Artifactory Target resource\n","properties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Target name\n"},"targetArtifactoryId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object","required":["artifactoryAdminName","artifactoryAdminPwd","baseUrl","name","targetArtifactoryId"],"inputProperties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Target name\n"},"targetArtifactoryId":{"type":"string","description":"The ID of this resource.\n"}},"requiredInputs":["artifactoryAdminName","artifactoryAdminPwd","baseUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetArtifactory resources.\n","properties":{"artifactoryAdminName":{"type":"string","description":"Admin name\n"},"artifactoryAdminPwd":{"type":"string","description":"Admin API Key/Password\n"},"baseUrl":{"type":"string","description":"Artifactory REST URL, must end with artifactory postfix\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used)\n"},"name":{"type":"string","description":"Target name\n"},"targetArtifactoryId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object"}},"akeyless:index/targetAws:TargetAws":{"description":"AWS Target resource\n","properties":{"accessKey":{"type":"string","description":"AWS secret access key\n"},"accessKeyId":{"type":"string","description":"AWS access key ID\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"region":{"type":"string","description":"AWS region\n"},"sessionToken":{"type":"string","description":"Required only for temporary security credentials retrieved using STS\n"},"targetAwsId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object","required":["accessKeyId","name","targetAwsId"],"inputProperties":{"accessKey":{"type":"string","description":"AWS secret access key\n"},"accessKeyId":{"type":"string","description":"AWS access key ID\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"region":{"type":"string","description":"AWS region\n"},"sessionToken":{"type":"string","description":"Required only for temporary security credentials retrieved using STS\n"},"targetAwsId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"requiredInputs":["accessKeyId"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetAws resources.\n","properties":{"accessKey":{"type":"string","description":"AWS secret access key\n"},"accessKeyId":{"type":"string","description":"AWS access key ID\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"region":{"type":"string","description":"AWS region\n"},"sessionToken":{"type":"string","description":"Required only for temporary security credentials retrieved using STS\n"},"targetAwsId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object"}},"akeyless:index/targetAzure:TargetAzure":{"description":"Azure Target resource\n","properties":{"clientId":{"type":"string","description":"Azure client/application id\n"},"clientSecret":{"type":"string","description":"Azure client secret\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key is used to encrypt the target secret value. If the key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetAzureId":{"type":"string","description":"The ID of this resource.\n"},"tenantId":{"type":"string","description":"Azure tenant id\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object","required":["name","targetAzureId"],"inputProperties":{"clientId":{"type":"string","description":"Azure client/application id\n"},"clientSecret":{"type":"string","description":"Azure client secret\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key is used to encrypt the target secret value. If the key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetAzureId":{"type":"string","description":"The ID of this resource.\n"},"tenantId":{"type":"string","description":"Azure tenant id\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering TargetAzure resources.\n","properties":{"clientId":{"type":"string","description":"Azure client/application id\n"},"clientSecret":{"type":"string","description":"Azure client secret\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key is used to encrypt the target secret value. If the key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetAzureId":{"type":"string","description":"The ID of this resource.\n"},"tenantId":{"type":"string","description":"Azure tenant id\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object"}},"akeyless:index/targetDb:TargetDb":{"description":"DB Target resource\n","properties":{"dbName":{"type":"string","description":"Database name\n"},"dbServerCertificates":{"type":"string","description":"Set of root certificate authorities in base64 encoding used by clients to verify server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is provided. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dbType":{"type":"string","description":"Database type: mysql/mssql/postgres/mongodb/snowflake/oracle/cassandra/redshift\n"},"description":{"type":"string","description":"Description of the object\n"},"host":{"type":"string","description":"Database host\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"mongodbAtlas":{"type":"boolean","description":"Flag, set database type to mongodb and the flag to true to create Mongo Atlas target\n"},"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"name":{"type":"string","description":"Target name\n"},"oracleServiceName":{"type":"string","description":"oracle db service name\n"},"port":{"type":"string","description":"Database port\n"},"pwd":{"type":"string","description":"Database password\n"},"snowflakeAccount":{"type":"string","description":"Snowflake account name\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"targetDbId":{"type":"string","description":"The ID of this resource.\n"},"userName":{"type":"string","description":"Database user name\n"}},"type":"object","required":["dbType","name","targetDbId"],"inputProperties":{"dbName":{"type":"string","description":"Database name\n"},"dbServerCertificates":{"type":"string","description":"Set of root certificate authorities in base64 encoding used by clients to verify server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is provided. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dbType":{"type":"string","description":"Database type: mysql/mssql/postgres/mongodb/snowflake/oracle/cassandra/redshift\n"},"description":{"type":"string","description":"Description of the object\n"},"host":{"type":"string","description":"Database host\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"mongodbAtlas":{"type":"boolean","description":"Flag, set database type to mongodb and the flag to true to create Mongo Atlas target\n"},"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"name":{"type":"string","description":"Target name\n"},"oracleServiceName":{"type":"string","description":"oracle db service name\n"},"port":{"type":"string","description":"Database port\n"},"pwd":{"type":"string","description":"Database password\n"},"snowflakeAccount":{"type":"string","description":"Snowflake account name\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"targetDbId":{"type":"string","description":"The ID of this resource.\n"},"userName":{"type":"string","description":"Database user name\n"}},"requiredInputs":["dbType"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetDb resources.\n","properties":{"dbName":{"type":"string","description":"Database name\n"},"dbServerCertificates":{"type":"string","description":"Set of root certificate authorities in base64 encoding used by clients to verify server certificates\n"},"dbServerName":{"type":"string","description":"Server name is used to verify the hostname on the returned certificates unless InsecureSkipVerify is provided. It is also included in the client's handshake to support virtual hosting unless it is an IP address\n"},"dbType":{"type":"string","description":"Database type: mysql/mssql/postgres/mongodb/snowflake/oracle/cassandra/redshift\n"},"description":{"type":"string","description":"Description of the object\n"},"host":{"type":"string","description":"Database host\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"mongodbAtlas":{"type":"boolean","description":"Flag, set database type to mongodb and the flag to true to create Mongo Atlas target\n"},"mongodbAtlasApiPrivateKey":{"type":"string","description":"MongoDB Atlas private key\n"},"mongodbAtlasApiPublicKey":{"type":"string","description":"MongoDB Atlas public key\n"},"mongodbAtlasProjectId":{"type":"string","description":"MongoDB Atlas project ID\n"},"mongodbDefaultAuthDb":{"type":"string","description":"MongoDB server default authentication database\n"},"mongodbUriOptions":{"type":"string","description":"MongoDB server URI options (e.g. replicaSet=mySet\u0026authSource=authDB)\n"},"name":{"type":"string","description":"Target name\n"},"oracleServiceName":{"type":"string","description":"oracle db service name\n"},"port":{"type":"string","description":"Database port\n"},"pwd":{"type":"string","description":"Database password\n"},"snowflakeAccount":{"type":"string","description":"Snowflake account name\n"},"ssl":{"type":"boolean","description":"Enable/Disable SSL [true/false]\n"},"sslCertificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n"},"targetDbId":{"type":"string","description":"The ID of this resource.\n"},"userName":{"type":"string","description":"Database user name\n"}},"type":"object"}},"akeyless:index/targetEks:TargetEks":{"description":"EKS Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"eksAccessKeyId":{"type":"string","description":"EKS access key ID\n"},"eksClusterCaCert":{"type":"string","description":"EKS cluster base-64 encoded certificate\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS cluster endpoint (i.e., https://\\n\\n of the cluster)\n"},"eksClusterName":{"type":"string","description":"EKS cluster name\n"},"eksRegion":{"type":"string","description":"EKS region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS secret access key\n","secret":true},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetEksId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object","required":["eksAccessKeyId","eksClusterCaCert","eksClusterEndpoint","eksClusterName","eksSecretAccessKey","name","targetEksId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"eksAccessKeyId":{"type":"string","description":"EKS access key ID\n"},"eksClusterCaCert":{"type":"string","description":"EKS cluster base-64 encoded certificate\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS cluster endpoint (i.e., https://\\n\\n of the cluster)\n"},"eksClusterName":{"type":"string","description":"EKS cluster name\n"},"eksRegion":{"type":"string","description":"EKS region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS secret access key\n","secret":true},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetEksId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"requiredInputs":["eksAccessKeyId","eksClusterCaCert","eksClusterEndpoint","eksClusterName","eksSecretAccessKey"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetEks resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"eksAccessKeyId":{"type":"string","description":"EKS access key ID\n"},"eksClusterCaCert":{"type":"string","description":"EKS cluster base-64 encoded certificate\n","secret":true},"eksClusterEndpoint":{"type":"string","description":"EKS cluster endpoint (i.e., https://\\n\\n of the cluster)\n"},"eksClusterName":{"type":"string","description":"EKS cluster name\n"},"eksRegion":{"type":"string","description":"EKS region\n"},"eksSecretAccessKey":{"type":"string","description":"EKS secret access key\n","secret":true},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetEksId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object"}},"akeyless:index/targetGcp:TargetGcp":{"description":"GCP Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n","secret":true},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetGcpId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object","required":["name","targetGcpId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n","secret":true},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetGcpId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering TargetGcp resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"gcpKey":{"type":"string","description":"Base64-encoded service account private key text\n","secret":true},"gcpSaEmail":{"type":"string","description":"GCP service account email\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetGcpId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object"}},"akeyless:index/targetGithub:TargetGithub":{"description":"Github Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetGithubId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object","required":["name","targetGithubId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetGithubId":{"type":"string","description":"The ID of this resource.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering TargetGithub resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"githubAppId":{"type":"number","description":"Github application id\n"},"githubAppPrivateKey":{"type":"string","description":"Github application private key (base64 encoded key)\n"},"githubBaseUrl":{"type":"string","description":"Github base url\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetGithubId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object"}},"akeyless:index/targetGitlab:TargetGitlab":{"description":"Gitlab Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"gitlabAccessToken":{"type":"string","description":"Gitlab access token\n","secret":true},"gitlabCertificate":{"type":"string","description":"Gitlab tls certificate (base64 encoded)\n","secret":true},"gitlabUrl":{"type":"string","description":"Gitlab base url\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetGitlabId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object","required":["name","targetGitlabId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"gitlabAccessToken":{"type":"string","description":"Gitlab access token\n","secret":true},"gitlabCertificate":{"type":"string","description":"Gitlab tls certificate (base64 encoded)\n","secret":true},"gitlabUrl":{"type":"string","description":"Gitlab base url\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetGitlabId":{"type":"string","description":"The ID of this resource.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering TargetGitlab resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"gitlabAccessToken":{"type":"string","description":"Gitlab access token\n","secret":true},"gitlabCertificate":{"type":"string","description":"Gitlab tls certificate (base64 encoded)\n","secret":true},"gitlabUrl":{"type":"string","description":"Gitlab base url\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetGitlabId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object"}},"akeyless:index/targetGke:TargetGke":{"description":"GKE Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetGkeId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object","required":["name","targetGkeId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetGkeId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering TargetGke resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"gkeAccountKey":{"type":"string","description":"GKE service account key\n"},"gkeClusterCert":{"type":"string","description":"GKE Base-64 encoded cluster certificate\n"},"gkeClusterEndpoint":{"type":"string","description":"GKE cluster endpoint, i.e., cluster URI https://\\n\\n.\n"},"gkeClusterName":{"type":"string","description":"GKE cluster name\n"},"gkeServiceAccountEmail":{"type":"string","description":"GKE service account email\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetGkeId":{"type":"string","description":"The ID of this resource.\n"},"useGwCloudIdentity":{"type":"boolean","description":"Use the GW's Cloud IAM\n"}},"type":"object"}},"akeyless:index/targetGlobalsign:TargetGlobalsign":{"description":"GlobalSign Target resource\n","properties":{"contactEmail":{"type":"string","description":"Email of the GlobalSign GCC account contact\n"},"contactFirstName":{"type":"string","description":"First name of the GlobalSign GCC account contact\n"},"contactLastName":{"type":"string","description":"Last name of the GlobalSign GCC account contact\n"},"contactPhone":{"type":"string","description":"Telephone of the GlobalSign GCC account contact\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"password":{"type":"string","description":"Password of the GlobalSign GCC account\n","secret":true},"profileId":{"type":"string","description":"Profile ID of the GlobalSign GCC account\n"},"targetGlobalsignId":{"type":"string","description":"The ID of this resource.\n"},"timeout":{"type":"string","description":"Timeout waiting for certificate validation\n"},"username":{"type":"string","description":"Username of the GlobalSign GCC account\n"}},"type":"object","required":["contactEmail","contactFirstName","contactLastName","contactPhone","name","password","profileId","targetGlobalsignId","username"],"inputProperties":{"contactEmail":{"type":"string","description":"Email of the GlobalSign GCC account contact\n"},"contactFirstName":{"type":"string","description":"First name of the GlobalSign GCC account contact\n"},"contactLastName":{"type":"string","description":"Last name of the GlobalSign GCC account contact\n"},"contactPhone":{"type":"string","description":"Telephone of the GlobalSign GCC account contact\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"password":{"type":"string","description":"Password of the GlobalSign GCC account\n","secret":true},"profileId":{"type":"string","description":"Profile ID of the GlobalSign GCC account\n"},"targetGlobalsignId":{"type":"string","description":"The ID of this resource.\n"},"timeout":{"type":"string","description":"Timeout waiting for certificate validation\n"},"username":{"type":"string","description":"Username of the GlobalSign GCC account\n"}},"requiredInputs":["contactEmail","contactFirstName","contactLastName","contactPhone","password","profileId","username"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetGlobalsign resources.\n","properties":{"contactEmail":{"type":"string","description":"Email of the GlobalSign GCC account contact\n"},"contactFirstName":{"type":"string","description":"First name of the GlobalSign GCC account contact\n"},"contactLastName":{"type":"string","description":"Last name of the GlobalSign GCC account contact\n"},"contactPhone":{"type":"string","description":"Telephone of the GlobalSign GCC account contact\n"},"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"password":{"type":"string","description":"Password of the GlobalSign GCC account\n","secret":true},"profileId":{"type":"string","description":"Profile ID of the GlobalSign GCC account\n"},"targetGlobalsignId":{"type":"string","description":"The ID of this resource.\n"},"timeout":{"type":"string","description":"Timeout waiting for certificate validation\n"},"username":{"type":"string","description":"Username of the GlobalSign GCC account\n"}},"type":"object"}},"akeyless:index/targetK8s:TargetK8s":{"description":"K8S Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetK8sId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object","required":["k8sClusterCaCert","k8sClusterEndpoint","k8sClusterToken","name","targetK8sId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetK8sId":{"type":"string","description":"The ID of this resource.\n"}},"requiredInputs":["k8sClusterCaCert","k8sClusterEndpoint","k8sClusterToken"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetK8s resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"k8sClusterCaCert":{"type":"string","description":"K8S Cluster certificate. Base 64 encoded certificate.\n","secret":true},"k8sClusterEndpoint":{"type":"string","description":"K8S Cluster endpoint. https:// , \\n\\n of the cluster.\n"},"k8sClusterToken":{"type":"string","description":"K8S Cluster authentication token.\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used.\n"},"name":{"type":"string","description":"Target name\n"},"targetK8sId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object"}},"akeyless:index/targetLinked:TargetLinked":{"description":"Linked Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"hosts":{"type":"string","description":"A comma seperated list of server hosts and server descriptions joined by semicolon ';' (i.e. 'server-dev.com;My Dev server,server-prod.com;My Prod server description')\n"},"name":{"type":"string","description":"Linked Target name\n"},"parentTargetName":{"type":"string","description":"The parent Target name\n"},"targetLinkedId":{"type":"string","description":"The ID of this resource.\n"},"type":{"type":"string","description":"Specifies the hosts type, relevant only when working without parent target\n"}},"type":"object","required":["name","targetLinkedId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"hosts":{"type":"string","description":"A comma seperated list of server hosts and server descriptions joined by semicolon ';' (i.e. 'server-dev.com;My Dev server,server-prod.com;My Prod server description')\n"},"name":{"type":"string","description":"Linked Target name\n"},"parentTargetName":{"type":"string","description":"The parent Target name\n"},"targetLinkedId":{"type":"string","description":"The ID of this resource.\n"},"type":{"type":"string","description":"Specifies the hosts type, relevant only when working without parent target\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering TargetLinked resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"hosts":{"type":"string","description":"A comma seperated list of server hosts and server descriptions joined by semicolon ';' (i.e. 'server-dev.com;My Dev server,server-prod.com;My Prod server description')\n"},"name":{"type":"string","description":"Linked Target name\n"},"parentTargetName":{"type":"string","description":"The parent Target name\n"},"targetLinkedId":{"type":"string","description":"The ID of this resource.\n"},"type":{"type":"string","description":"Specifies the hosts type, relevant only when working without parent target\n"}},"type":"object"}},"akeyless:index/targetRabbit:TargetRabbit":{"description":"RabbitMQT Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"rabbitmqServerPassword":{"type":"string","description":"RabbitMQ server password\n"},"rabbitmqServerUri":{"type":"string","description":"RabbitMQ server URI\n"},"rabbitmqServerUser":{"type":"string","description":"RabbitMQ server user\n"},"targetRabbitId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object","required":["name","rabbitmqServerUri","rabbitmqServerUser","targetRabbitId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"rabbitmqServerPassword":{"type":"string","description":"RabbitMQ server password\n"},"rabbitmqServerUri":{"type":"string","description":"RabbitMQ server URI\n"},"rabbitmqServerUser":{"type":"string","description":"RabbitMQ server user\n"},"targetRabbitId":{"type":"string","description":"The ID of this resource.\n"}},"requiredInputs":["rabbitmqServerUri","rabbitmqServerUser"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetRabbit resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"rabbitmqServerPassword":{"type":"string","description":"RabbitMQ server password\n"},"rabbitmqServerUri":{"type":"string","description":"RabbitMQ server URI\n"},"rabbitmqServerUser":{"type":"string","description":"RabbitMQ server user\n"},"targetRabbitId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object"}},"akeyless:index/targetSsh:TargetSsh":{"description":"SSH Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"host":{"type":"string","description":"SSH host name\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"port":{"type":"string","description":"SSH port\n"},"privateKey":{"type":"string","description":"SSH private key\n"},"privateKeyPassword":{"type":"string","description":"SSH private key password\n"},"sshPassword":{"type":"string","description":"SSH password to rotate\n"},"sshUsername":{"type":"string","description":"SSH username\n"},"targetSshId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object","required":["name","targetSshId"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"host":{"type":"string","description":"SSH host name\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"port":{"type":"string","description":"SSH port\n"},"privateKey":{"type":"string","description":"SSH private key\n"},"privateKeyPassword":{"type":"string","description":"SSH private key password\n"},"sshPassword":{"type":"string","description":"SSH password to rotate\n"},"sshUsername":{"type":"string","description":"SSH username\n"},"targetSshId":{"type":"string","description":"The ID of this resource.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering TargetSsh resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"host":{"type":"string","description":"SSH host name\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"port":{"type":"string","description":"SSH port\n"},"privateKey":{"type":"string","description":"SSH private key\n"},"privateKeyPassword":{"type":"string","description":"SSH private key password\n"},"sshPassword":{"type":"string","description":"SSH password to rotate\n"},"sshUsername":{"type":"string","description":"SSH username\n"},"targetSshId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object"}},"akeyless:index/targetWeb:TargetWeb":{"description":"Web Target resource\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetWebId":{"type":"string","description":"The ID of this resource.\n"},"url":{"type":"string","description":"Web target URL\n"}},"type":"object","required":["name","targetWebId","url"],"inputProperties":{"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetWebId":{"type":"string","description":"The ID of this resource.\n"},"url":{"type":"string","description":"Web target URL\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetWeb resources.\n","properties":{"description":{"type":"string","description":"Description of the object\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetWebId":{"type":"string","description":"The ID of this resource.\n"},"url":{"type":"string","description":"Web target URL\n"}},"type":"object"}},"akeyless:index/targetWindows:TargetWindows":{"description":"windows Target resource\n","properties":{"certificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"domain":{"type":"string","description":"User domain name\n"},"hostname":{"type":"string","description":"server hostname or IP Address\n"},"key":{"type":"string","description":"Key name. The key is used to encrypt the target secret value. If the key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"password":{"type":"string","description":"Privileged user password\n","secret":true},"port":{"type":"string","description":"Server WinRM port\n"},"targetWindowsId":{"type":"string","description":"The ID of this resource.\n"},"useTls":{"type":"string","description":"Enable/Disable TLS for WinRM over HTTPS [true/false]\n"},"username":{"type":"string","description":"Privileged username\n"}},"type":"object","required":["hostname","name","password","targetWindowsId","username"],"inputProperties":{"certificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"domain":{"type":"string","description":"User domain name\n"},"hostname":{"type":"string","description":"server hostname or IP Address\n"},"key":{"type":"string","description":"Key name. The key is used to encrypt the target secret value. If the key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"password":{"type":"string","description":"Privileged user password\n","secret":true},"port":{"type":"string","description":"Server WinRM port\n"},"targetWindowsId":{"type":"string","description":"The ID of this resource.\n"},"useTls":{"type":"string","description":"Enable/Disable TLS for WinRM over HTTPS [true/false]\n"},"username":{"type":"string","description":"Privileged username\n"}},"requiredInputs":["hostname","password","username"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetWindows resources.\n","properties":{"certificate":{"type":"string","description":"SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"domain":{"type":"string","description":"User domain name\n"},"hostname":{"type":"string","description":"server hostname or IP Address\n"},"key":{"type":"string","description":"Key name. The key is used to encrypt the target secret value. If the key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"password":{"type":"string","description":"Privileged user password\n","secret":true},"port":{"type":"string","description":"Server WinRM port\n"},"targetWindowsId":{"type":"string","description":"The ID of this resource.\n"},"useTls":{"type":"string","description":"Enable/Disable TLS for WinRM over HTTPS [true/false]\n"},"username":{"type":"string","description":"Privileged username\n"}},"type":"object"}},"akeyless:index/targetZerossl:TargetZerossl":{"description":"ZeroSSL Target resource\n","properties":{"apiKey":{"type":"string","description":"API Key of the ZeroSSLTarget account\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"imapFqdn":{"type":"string","description":"FQDN of the IMAP service\n"},"imapPassword":{"type":"string","description":"Password to access the IMAP service\n","secret":true},"imapPort":{"type":"string","description":"Port of the IMAP service\n"},"imapTargetEmail":{"type":"string","description":"Email to use when asking ZeroSSL to send a validation email, if empty will use username\n"},"imapUsername":{"type":"string","description":"Username to access the IMAP service\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetZerosslId":{"type":"string","description":"The ID of this resource.\n"},"timeout":{"type":"string","description":"Timeout waiting for certificate validation\n"}},"type":"object","required":["apiKey","imapFqdn","imapPassword","imapUsername","name","targetZerosslId"],"inputProperties":{"apiKey":{"type":"string","description":"API Key of the ZeroSSLTarget account\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"imapFqdn":{"type":"string","description":"FQDN of the IMAP service\n"},"imapPassword":{"type":"string","description":"Password to access the IMAP service\n","secret":true},"imapPort":{"type":"string","description":"Port of the IMAP service\n"},"imapTargetEmail":{"type":"string","description":"Email to use when asking ZeroSSL to send a validation email, if empty will use username\n"},"imapUsername":{"type":"string","description":"Username to access the IMAP service\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetZerosslId":{"type":"string","description":"The ID of this resource.\n"},"timeout":{"type":"string","description":"Timeout waiting for certificate validation\n"}},"requiredInputs":["apiKey","imapFqdn","imapPassword","imapUsername"],"stateInputs":{"description":"Input properties used for looking up and filtering TargetZerossl resources.\n","properties":{"apiKey":{"type":"string","description":"API Key of the ZeroSSLTarget account\n","secret":true},"description":{"type":"string","description":"Description of the object\n"},"imapFqdn":{"type":"string","description":"FQDN of the IMAP service\n"},"imapPassword":{"type":"string","description":"Password to access the IMAP service\n","secret":true},"imapPort":{"type":"string","description":"Port of the IMAP service\n"},"imapTargetEmail":{"type":"string","description":"Email to use when asking ZeroSSL to send a validation email, if empty will use username\n"},"imapUsername":{"type":"string","description":"Username to access the IMAP service\n"},"key":{"type":"string","description":"Key name. The key will be used to encrypt the target secret value. If key name is not specified, the account default protection key is used\n"},"name":{"type":"string","description":"Target name\n"},"targetZerosslId":{"type":"string","description":"The ID of this resource.\n"},"timeout":{"type":"string","description":"Timeout waiting for certificate validation\n"}},"type":"object"}},"akeyless:index/tokenizer:Tokenizer":{"description":"Tokenizer resource\n","properties":{"alphabet":{"type":"string","description":"Alphabet to use in custom vaultless tokenization, such as '0123456789' for credit cards.\n"},"decodingTemplate":{"type":"string","description":"The Decoding output template to use in custom vaultless tokenization\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"encodingTemplate":{"type":"string","description":"The Encoding output template to use in custom vaultless tokenization\n"},"encryptionKeyName":{"type":"string","description":"AES key name to use in vaultless tokenization\n"},"name":{"type":"string","description":"Tokenizer name\n"},"pattern":{"type":"string","description":"Pattern to use in custom vaultless tokenization\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"templateType":{"type":"string","description":"Which template type this tokenizer is used for [SSN,CreditCard,USPhoneNumber,Custom]\n"},"tokenizerId":{"type":"string","description":"The ID of this resource.\n"},"tokenizerType":{"type":"string","description":"Tokenizer type(vaultless)\n"},"tweak":{"type":"string"},"tweakType":{"type":"string","description":"The tweak type to use in vaultless tokenization [Supplied, Generated, Internal, Masking]\n"}},"type":"object","required":["name","templateType","tokenizerId","tweak"],"inputProperties":{"alphabet":{"type":"string","description":"Alphabet to use in custom vaultless tokenization, such as '0123456789' for credit cards.\n"},"decodingTemplate":{"type":"string","description":"The Decoding output template to use in custom vaultless tokenization\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"encodingTemplate":{"type":"string","description":"The Encoding output template to use in custom vaultless tokenization\n"},"encryptionKeyName":{"type":"string","description":"AES key name to use in vaultless tokenization\n"},"name":{"type":"string","description":"Tokenizer name\n"},"pattern":{"type":"string","description":"Pattern to use in custom vaultless tokenization\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"templateType":{"type":"string","description":"Which template type this tokenizer is used for [SSN,CreditCard,USPhoneNumber,Custom]\n"},"tokenizerId":{"type":"string","description":"The ID of this resource.\n"},"tokenizerType":{"type":"string","description":"Tokenizer type(vaultless)\n"},"tweakType":{"type":"string","description":"The tweak type to use in vaultless tokenization [Supplied, Generated, Internal, Masking]\n"}},"requiredInputs":["templateType"],"stateInputs":{"description":"Input properties used for looking up and filtering Tokenizer resources.\n","properties":{"alphabet":{"type":"string","description":"Alphabet to use in custom vaultless tokenization, such as '0123456789' for credit cards.\n"},"decodingTemplate":{"type":"string","description":"The Decoding output template to use in custom vaultless tokenization\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this item, [true/false]\n"},"description":{"type":"string","description":"Description of the object\n"},"encodingTemplate":{"type":"string","description":"The Encoding output template to use in custom vaultless tokenization\n"},"encryptionKeyName":{"type":"string","description":"AES key name to use in vaultless tokenization\n"},"name":{"type":"string","description":"Tokenizer name\n"},"pattern":{"type":"string","description":"Pattern to use in custom vaultless tokenization\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this key. To specify multiple tags use argument multiple times: --tag Tag1 --tag Tag2\n"},"templateType":{"type":"string","description":"Which template type this tokenizer is used for [SSN,CreditCard,USPhoneNumber,Custom]\n"},"tokenizerId":{"type":"string","description":"The ID of this resource.\n"},"tokenizerType":{"type":"string","description":"Tokenizer type(vaultless)\n"},"tweak":{"type":"string"},"tweakType":{"type":"string","description":"The tweak type to use in vaultless tokenization [Supplied, Generated, Internal, Masking]\n"}},"type":"object"}},"akeyless:index/usc:Usc":{"description":"Universal Secrets Connector resource\n","properties":{"azureKvName":{"type":"string","description":"Azure Key Vault name (Relevant only for Azure targets)\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the Universal Secrets Connector\n"},"k8sNamespace":{"type":"string","description":"K8s namespace (Relevant to Kubernetes targets)\n"},"name":{"type":"string","description":"Universal Secrets Connector name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this Universal Secrets Connector\n"},"targetToAssociate":{"type":"string","description":"Target Universal Secrets Connector to connect\n"},"uscId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object","required":["deleteProtection","name","targetToAssociate","uscId"],"inputProperties":{"azureKvName":{"type":"string","description":"Azure Key Vault name (Relevant only for Azure targets)\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the Universal Secrets Connector\n"},"k8sNamespace":{"type":"string","description":"K8s namespace (Relevant to Kubernetes targets)\n"},"name":{"type":"string","description":"Universal Secrets Connector name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this Universal Secrets Connector\n"},"targetToAssociate":{"type":"string","description":"Target Universal Secrets Connector to connect\n"},"uscId":{"type":"string","description":"The ID of this resource.\n"}},"requiredInputs":["targetToAssociate"],"stateInputs":{"description":"Input properties used for looking up and filtering Usc resources.\n","properties":{"azureKvName":{"type":"string","description":"Azure Key Vault name (Relevant only for Azure targets)\n"},"deleteProtection":{"type":"string","description":"Protection from accidental deletion of this object, [true/false]\n"},"description":{"type":"string","description":"Description of the Universal Secrets Connector\n"},"k8sNamespace":{"type":"string","description":"K8s namespace (Relevant to Kubernetes targets)\n"},"name":{"type":"string","description":"Universal Secrets Connector name\n"},"tags":{"type":"array","items":{"type":"string"},"description":"List of the tags attached to this Universal Secrets Connector\n"},"targetToAssociate":{"type":"string","description":"Target Universal Secrets Connector to connect\n"},"uscId":{"type":"string","description":"The ID of this resource.\n"}},"type":"object"}},"akeyless:index/uscSecret:UscSecret":{"description":"Universal Secrets Connector secret resource\n","properties":{"binaryValue":{"type":"boolean","description":"Use this option if the universal secrets value is a base64 encoded binary. (relevant for aws/azure/gcp/k8s targets)\n"},"description":{"type":"string","description":"Description of the universal secret (relevant for aws/hashi target)\n"},"namespace":{"type":"string","description":"The namespace (relevant for Hashi vault target)\n"},"objectType":{"type":"string","description":"Either secret or certificate (Relevant only for Azure KV targets)\n"},"secretId":{"type":"string","description":"The ID of the universal secrets item\n"},"secretName":{"type":"string","description":"Name for the new universal secrets\n"},"tags":{"type":"array","items":{"type":"string"},"description":"Tags for the universal secrets\n"},"uscName":{"type":"string","description":"Name of the Universal Secrets Connector item\n"},"uscSecretId":{"type":"string","description":"The ID of this resource.\n"},"value":{"type":"string","description":"Value of the universal secrets item, either text or base64 encoded binary\n","secret":true},"versionId":{"type":"string","description":"Version ID of the secret (if not specified, will retrieve the last version)\n"}},"type":"object","required":["secretId","secretName","uscName","uscSecretId","value"],"inputProperties":{"binaryValue":{"type":"boolean","description":"Use this option if the universal secrets value is a base64 encoded binary. (relevant for aws/azure/gcp/k8s targets)\n"},"description":{"type":"string","description":"Description of the universal secret (relevant for aws/hashi target)\n"},"namespace":{"type":"string","description":"The namespace (relevant for Hashi vault target)\n"},"objectType":{"type":"string","description":"Either secret or certificate (Relevant only for Azure KV targets)\n"},"secretName":{"type":"string","description":"Name for the new universal secrets\n"},"tags":{"type":"array","items":{"type":"string"},"description":"Tags for the universal secrets\n"},"uscName":{"type":"string","description":"Name of the Universal Secrets Connector item\n"},"uscSecretId":{"type":"string","description":"The ID of this resource.\n"},"value":{"type":"string","description":"Value of the universal secrets item, either text or base64 encoded binary\n","secret":true},"versionId":{"type":"string","description":"Version ID of the secret (if not specified, will retrieve the last version)\n"}},"requiredInputs":["secretName","uscName"],"stateInputs":{"description":"Input properties used for looking up and filtering UscSecret resources.\n","properties":{"binaryValue":{"type":"boolean","description":"Use this option if the universal secrets value is a base64 encoded binary. (relevant for aws/azure/gcp/k8s targets)\n"},"description":{"type":"string","description":"Description of the universal secret (relevant for aws/hashi target)\n"},"namespace":{"type":"string","description":"The namespace (relevant for Hashi vault target)\n"},"objectType":{"type":"string","description":"Either secret or certificate (Relevant only for Azure KV targets)\n"},"secretId":{"type":"string","description":"The ID of the universal secrets item\n"},"secretName":{"type":"string","description":"Name for the new universal secrets\n"},"tags":{"type":"array","items":{"type":"string"},"description":"Tags for the universal secrets\n"},"uscName":{"type":"string","description":"Name of the Universal Secrets Connector item\n"},"uscSecretId":{"type":"string","description":"The ID of this resource.\n"},"value":{"type":"string","description":"Value of the universal secrets item, either text or base64 encoded binary\n","secret":true},"versionId":{"type":"string","description":"Version ID of the secret (if not specified, will retrieve the last version)\n"}},"type":"object"}}},"functions":{"akeyless:index/getAuth:getAuth":{"description":"Authenticate to Akeyless and returns a token to be used by the provider\n","inputs":{"description":"A collection of arguments for invoking getAuth.\n","properties":{"apiKeyLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthApiKeyLogin:getAuthApiKeyLogin"},"description":"A configuration block, described below, that attempts to authenticate using API-Key.\n"},"awsIamLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthAwsIamLogin:getAuthAwsIamLogin"},"description":"A configuration block, described below, that attempts to authenticate using AWS-IAM authentication credentials.\n"},"azureAdLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthAzureAdLogin:getAuthAzureAdLogin"},"description":"A configuration block, described below, that attempts to authenticate using Azure Active Directory authentication.\n"},"certLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthCertLogin:getAuthCertLogin"},"description":"A configuration block, described below, that attempts to authenticate using Certificate authentication.  The Certificate and the Private key can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS*AUTH*CERT and AKEYLESS*AUTH*KEY.\n"},"emailLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthEmailLogin:getAuthEmailLogin"},"description":"A configuration block, described below, that attempts to authenticate using email and password.\n"},"gcpLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthGcpLogin:getAuthGcpLogin"},"description":"A configuration block, described below, that attempts to authenticate using GCP-IAM authentication credentials.\n"},"id":{"type":"string","description":"The ID of this resource.\n"},"jwtLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthJwtLogin:getAuthJwtLogin"},"description":"A configuration block, described below, that attempts to authenticate using JWT authentication.  The JWT can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS*AUTH*JWT.\n"},"uidLogins":{"type":"array","items":{"$ref":"#/types/akeyless:index%2FgetAuthUidLogin:getAuthUidLogin"},"description":"A configuration block, described below, that attempts to authenticate using Universal Identity authentication.\n"}},"type":"object"},"outputs":{"description":"A collection of values returned by getAuth.\n","properties":{"apiKeyLogins":{"description":"A configuration block, described below, that attempts to authenticate using API-Key.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthApiKeyLogin:getAuthApiKeyLogin"},"type":"array"},"awsIamLogins":{"description":"A configuration block, described below, that attempts to authenticate using AWS-IAM authentication credentials.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthAwsIamLogin:getAuthAwsIamLogin"},"type":"array"},"azureAdLogins":{"description":"A configuration block, described below, that attempts to authenticate using Azure Active Directory authentication.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthAzureAdLogin:getAuthAzureAdLogin"},"type":"array"},"certLogins":{"description":"A configuration block, described below, that attempts to authenticate using Certificate authentication.  The Certificate and the Private key can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS*AUTH*CERT and AKEYLESS*AUTH*KEY.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthCertLogin:getAuthCertLogin"},"type":"array"},"emailLogins":{"description":"A configuration block, described below, that attempts to authenticate using email and password.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthEmailLogin:getAuthEmailLogin"},"type":"array"},"gcpLogins":{"description":"A configuration block, described below, that attempts to authenticate using GCP-IAM authentication credentials.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthGcpLogin:getAuthGcpLogin"},"type":"array"},"id":{"description":"The ID of this resource.\n","type":"string"},"jwtLogins":{"description":"A configuration block, described below, that attempts to authenticate using JWT authentication.  The JWT can be provided as a command line variable or it will be pulled out of an environment variable named AKEYLESS*AUTH*JWT.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthJwtLogin:getAuthJwtLogin"},"type":"array"},"token":{"description":"The token\n","secret":true,"type":"string"},"uidLogins":{"description":"A configuration block, described below, that attempts to authenticate using Universal Identity authentication.\n","items":{"$ref":"#/types/akeyless:index%2FgetAuthUidLogin:getAuthUidLogin"},"type":"array"}},"required":["id","token"],"type":"object"}},"akeyless:index/getAuthMethod:getAuthMethod":{"description":"Auth Method data source\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as akeyless from \"@pulumi/akeyless\";\n\nconst apiKey = akeyless.getAuthMethod({\n    path: \"terraform/auth-method-api-key\",\n});\n```\n```python\nimport pulumi\nimport pulumi_akeyless as akeyless\n\napi_key = akeyless.get_auth_method(path=\"terraform/auth-method-api-key\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Akeyless = Pulumi.Akeyless;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var apiKey = Akeyless.GetAuthMethod.Invoke(new()\n    {\n        Path = \"terraform/auth-method-api-key\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := akeyless.LookupAuthMethod(ctx, \u0026akeyless.LookupAuthMethodArgs{\n\t\t\tPath: \"terraform/auth-method-api-key\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.akeyless.AkeylessFunctions;\nimport com.pulumi.akeyless.inputs.GetAuthMethodArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var apiKey = AkeylessFunctions.getAuthMethod(GetAuthMethodArgs.builder()\n            .path(\"terraform/auth-method-api-key\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  apiKey:\n    fn::invoke:\n      function: akeyless:getAuthMethod\n      arguments:\n        path: terraform/auth-method-api-key\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getAuthMethod.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"path":{"type":"string","description":"The path where the secret is stored. Defaults to the latest version.\n"}},"type":"object","required":["path"]},"outputs":{"description":"A collection of values returned by getAuthMethod.\n","properties":{"accessId":{"description":"The version of the secret.\n","type":"string"},"accountId":{"description":"The version of the secret.\n","type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"path":{"description":"The path where the secret is stored. Defaults to the latest version.\n","type":"string"}},"required":["accessId","accountId","id","path"],"type":"object"}},"akeyless:index/getCertificate:getCertificate":{"description":"Certificate data source\n","inputs":{"description":"A collection of arguments for invoking getCertificate.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"name":{"type":"string","description":"Certificate name\n"},"version":{"type":"number","description":"Certificate version\n"}},"type":"object"},"outputs":{"description":"A collection of values returned by getCertificate.\n","properties":{"certificatePem":{"description":"The certificate value in pem format\n","secret":true,"type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"ignoreCache":{"description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n","type":"string"},"name":{"description":"Certificate name\n","type":"string"},"privateKeyPem":{"description":"The private key value in pem format\n","secret":true,"type":"string"},"version":{"description":"Certificate version\n","type":"number"}},"required":["certificatePem","id","privateKeyPem"],"type":"object"}},"akeyless:index/getCsr:getCsr":{"description":"Generate a new CSR data source\n","inputs":{"description":"A collection of arguments for invoking getCsr.\n","properties":{"alg":{"type":"string","description":"The algorithm (RSA/Elliptic-curve) to use for generating the new key\n"},"altNames":{"type":"string","description":"A comma-separated list of dns alternative names\n"},"certificateType":{"type":"string","description":"The certificate type to be included in the CSR certificate (ssl-client/ssl-server/certificate-signing)\n"},"city":{"type":"string","description":"The city to be included in the CSR\n"},"commonName":{"type":"string","description":"The common name to be included in the CSR certificate\n"},"country":{"type":"string","description":"The country to be included in the CSR\n"},"critical":{"type":"boolean","description":"Add critical to the key usage extension (will be false if not added)\n"},"dep":{"type":"string","description":"The department to be included in the CSR\n"},"emailAddresses":{"type":"string","description":"A comma-separated list of email addresses alternative names\n"},"generateKey":{"type":"boolean","description":"Generate a new classic key for the csr\n"},"id":{"type":"string","description":"The ID of this resource.\n"},"ipAddresses":{"type":"string","description":"A comma-separated list of ip addresses alternative names\n"},"keyType":{"type":"string","description":"The type of the key to generate (classic-key/dfc)\n"},"name":{"type":"string","description":"The classic key name\n"},"org":{"type":"string","description":"The organization to be included in the CSR\n"},"splitLevel":{"type":"number","description":"The number of fragments that the item will be split into (not includes customer fragment, relevant only for dfc keys)\n"},"state":{"type":"string","description":"The state to be included in the CSR\n"},"uriSans":{"type":"string","description":"A comma-separated list of uri alternative names\n"}},"type":"object","required":["commonName","name"]},"outputs":{"description":"A collection of values returned by getCsr.\n","properties":{"alg":{"description":"The algorithm (RSA/Elliptic-curve) to use for generating the new key\n","type":"string"},"altNames":{"description":"A comma-separated list of dns alternative names\n","type":"string"},"certificateType":{"description":"The certificate type to be included in the CSR certificate (ssl-client/ssl-server/certificate-signing)\n","type":"string"},"city":{"description":"The city to be included in the CSR\n","type":"string"},"commonName":{"description":"The common name to be included in the CSR certificate\n","type":"string"},"country":{"description":"The country to be included in the CSR\n","type":"string"},"critical":{"description":"Add critical to the key usage extension (will be false if not added)\n","type":"boolean"},"data":{"type":"string"},"dep":{"description":"The department to be included in the CSR\n","type":"string"},"emailAddresses":{"description":"A comma-separated list of email addresses alternative names\n","type":"string"},"generateKey":{"description":"Generate a new classic key for the csr\n","type":"boolean"},"id":{"description":"The ID of this resource.\n","type":"string"},"ipAddresses":{"description":"A comma-separated list of ip addresses alternative names\n","type":"string"},"keyType":{"description":"The type of the key to generate (classic-key/dfc)\n","type":"string"},"name":{"description":"The classic key name\n","type":"string"},"org":{"description":"The organization to be included in the CSR\n","type":"string"},"splitLevel":{"description":"The number of fragments that the item will be split into (not includes customer fragment, relevant only for dfc keys)\n","type":"number"},"state":{"description":"The state to be included in the CSR\n","type":"string"},"uriSans":{"description":"A comma-separated list of uri alternative names\n","type":"string"}},"required":["commonName","data","id","name"],"type":"object"}},"akeyless:index/getDetokenize:getDetokenize":{"description":"Decrypts text with a tokenizer data source\n","inputs":{"description":"A collection of arguments for invoking getDetokenize.\n","properties":{"ciphertext":{"type":"string","description":"Data to be decrypted\n"},"id":{"type":"string","description":"The ID of this resource.\n"},"tokenizerName":{"type":"string","description":"The name of the tokenizer to use in the decryption process\n"},"tweak":{"type":"string","description":"Base64 encoded tweak for vaultless encryption\n"}},"type":"object","required":["ciphertext","tokenizerName"]},"outputs":{"description":"A collection of values returned by getDetokenize.\n","properties":{"ciphertext":{"description":"Data to be decrypted\n","type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"result":{"type":"string"},"tokenizerName":{"description":"The name of the tokenizer to use in the decryption process\n","type":"string"},"tweak":{"description":"Base64 encoded tweak for vaultless encryption\n","type":"string"}},"required":["ciphertext","id","result","tokenizerName","tweak"],"type":"object"}},"akeyless:index/getDynamicSecret:getDynamicSecret":{"description":"Dynamic Secret data source\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as akeyless from \"@pulumi/akeyless\";\n\nconst secret = akeyless.getDynamicSecret({\n    path: \"terraform/dynamic-secret\",\n});\n```\n```python\nimport pulumi\nimport pulumi_akeyless as akeyless\n\nsecret = akeyless.get_dynamic_secret(path=\"terraform/dynamic-secret\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Akeyless = Pulumi.Akeyless;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var secret = Akeyless.GetDynamicSecret.Invoke(new()\n    {\n        Path = \"terraform/dynamic-secret\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := akeyless.GetDynamicSecret(ctx, \u0026akeyless.GetDynamicSecretArgs{\n\t\t\tPath: \"terraform/dynamic-secret\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.akeyless.AkeylessFunctions;\nimport com.pulumi.akeyless.inputs.GetDynamicSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var secret = AkeylessFunctions.getDynamicSecret(GetDynamicSecretArgs.builder()\n            .path(\"terraform/dynamic-secret\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  secret:\n    fn::invoke:\n      function: akeyless:getDynamicSecret\n      arguments:\n        path: terraform/dynamic-secret\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getDynamicSecret.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"path":{"type":"string","description":"The path where the secret is stored. Defaults to the latest version.\n"}},"type":"object","required":["path"]},"outputs":{"description":"A collection of values returned by getDynamicSecret.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"path":{"description":"The path where the secret is stored. Defaults to the latest version.\n","type":"string"},"value":{"description":"The secret contents.\n","secret":true,"type":"string"}},"required":["id","path","value"],"type":"object"}},"akeyless:index/getItems:getItems":{"description":"Get items data source\n","inputs":{"description":"A collection of arguments for invoking getItems.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"path":{"type":"string","description":"The path where the items are stored.\n"}},"type":"object","required":["path"]},"outputs":{"description":"A collection of values returned by getItems.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"items":{"description":"List of items on a given path\n","items":{"$ref":"#/types/akeyless:index%2FgetItemsItem:getItemsItem"},"type":"array"},"path":{"description":"The path where the items are stored.\n","type":"string"}},"required":["id","items","path"],"type":"object"}},"akeyless:index/getK8sAuthConfig:getK8sAuthConfig":{"description":"Gets K8S Auth config data source\n","inputs":{"description":"A collection of arguments for invoking getK8sAuthConfig.\n","properties":{"name":{"type":"string","description":"K8S Auth config name\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getK8sAuthConfig.\n","properties":{"amTokenExpiration":{"type":"number"},"authMethodAccessId":{"type":"string"},"authMethodPrvKeyPem":{"secret":true,"type":"string"},"disableIssValidation":{"type":"boolean"},"id":{"description":"The ID of this resource.\n","type":"string"},"k8sCaCert":{"type":"string"},"k8sHost":{"type":"string"},"k8sIssuer":{"type":"string"},"k8sPubKeysPems":{"items":{"type":"string"},"type":"array"},"k8sTokenReviewerJwt":{"type":"string"},"name":{"description":"K8S Auth config name\n","type":"string"},"protectionKey":{"type":"string"},"useLocalCaJwt":{"type":"boolean"}},"required":["amTokenExpiration","authMethodAccessId","authMethodPrvKeyPem","disableIssValidation","id","k8sCaCert","k8sHost","k8sIssuer","k8sPubKeysPems","k8sTokenReviewerJwt","name","protectionKey","useLocalCaJwt"],"type":"object"}},"akeyless:index/getKubeExecCreds:getKubeExecCreds":{"description":"Get credentials for authentication with Kubernetes cluster based on a PKI Cert Issuer data source\n","inputs":{"description":"A collection of arguments for invoking getKubeExecCreds.\n","properties":{"altNames":{"type":"string","description":"The Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n"},"certIssuerName":{"type":"string","description":"The name of the PKI certificate issuer\n"},"commonName":{"type":"string","description":"The common name to be included in the PKI certificate\n"},"id":{"type":"string","description":"The ID of this resource.\n"},"keyDataBase64":{"type":"string","description":"pki key file contents encoded using Base64. If this option is used, the certificate will be printed to stdout\n","secret":true},"uriSans":{"type":"string","description":"The URI Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n"}},"type":"object","required":["certIssuerName"]},"outputs":{"description":"A collection of values returned by getKubeExecCreds.\n","properties":{"altNames":{"description":"The Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n","type":"string"},"apiVersion":{"type":"string"},"certIssuerName":{"description":"The name of the PKI certificate issuer\n","type":"string"},"clientCertificateData":{"type":"string"},"clientKeyData":{"type":"string"},"commonName":{"description":"The common name to be included in the PKI certificate\n","type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"keyDataBase64":{"description":"pki key file contents encoded using Base64. If this option is used, the certificate will be printed to stdout\n","secret":true,"type":"string"},"kind":{"type":"string"},"parentCertificateData":{"type":"string"},"uriSans":{"description":"The URI Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n","type":"string"}},"required":["apiVersion","certIssuerName","clientCertificateData","clientKeyData","id","kind","parentCertificateData"],"type":"object"}},"akeyless:index/getPkiCertificate:getPkiCertificate":{"description":"Generates PKI certificate data source\n","inputs":{"description":"A collection of arguments for invoking getPkiCertificate.\n","properties":{"altNames":{"type":"string","description":"The Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n"},"certIssuerName":{"type":"string","description":"The name of the PKI certificate issuer\n"},"commonName":{"type":"string","description":"The common name to be included in the PKI certificate\n"},"csrDataBase64":{"type":"string","description":"Certificate Signing Request contents encoded in base64 to generate the certificate with\n"},"extendedKeyUsage":{"type":"string","description":"A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'.\n"},"id":{"type":"string","description":"The ID of this resource.\n"},"keyDataBase64":{"type":"string","description":"pki key file contents encoded using Base64\n","secret":true},"ttl":{"type":"number","description":"Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)\n"},"uriSans":{"type":"string","description":"The URI Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n"}},"type":"object","required":["certIssuerName"]},"outputs":{"description":"A collection of values returned by getPkiCertificate.\n","properties":{"altNames":{"description":"The Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n","type":"string"},"certDisplayId":{"type":"string"},"certIssuerName":{"description":"The name of the PKI certificate issuer\n","type":"string"},"commonName":{"description":"The common name to be included in the PKI certificate\n","type":"string"},"csrDataBase64":{"description":"Certificate Signing Request contents encoded in base64 to generate the certificate with\n","type":"string"},"data":{"type":"string"},"extendedKeyUsage":{"description":"A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'.\n","type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"keyDataBase64":{"description":"pki key file contents encoded using Base64\n","secret":true,"type":"string"},"parentCert":{"type":"string"},"readingToken":{"type":"string"},"ttl":{"description":"Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)\n","type":"number"},"uriSans":{"description":"The URI Subject Alternative Names to be included in the PKI certificate (in a comma-delimited list)\n","type":"string"}},"required":["certDisplayId","certIssuerName","data","id","parentCert","readingToken"],"type":"object"}},"akeyless:index/getProducerTmpCreds:getProducerTmpCreds":{"description":"Get producer temporary credentials list data source\n","inputs":{"description":"A collection of arguments for invoking getProducerTmpCreds.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Producer Name\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getProducerTmpCreds.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"name":{"description":"Producer Name\n","type":"string"},"value":{"type":"string"}},"required":["id","name","value"],"type":"object"}},"akeyless:index/getResetAccessKey:getResetAccessKey":{"description":"Reset an Auth Method access key and return the new key\n","inputs":{"description":"A collection of arguments for invoking getResetAccessKey.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Auth Method name\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getResetAccessKey.\n","properties":{"accessKey":{"description":"The newly generated access key\n","secret":true,"type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"name":{"description":"Auth Method name\n","type":"string"}},"required":["accessKey","id","name"],"type":"object"}},"akeyless:index/getRole:getRole":{"description":"Role data source\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as akeyless from \"@pulumi/akeyless\";\n\nconst demo_role = akeyless.getRole({\n    name: \"terraform/demo-role\",\n});\n```\n```python\nimport pulumi\nimport pulumi_akeyless as akeyless\n\ndemo_role = akeyless.get_role(name=\"terraform/demo-role\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Akeyless = Pulumi.Akeyless;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var demo_role = Akeyless.GetRole.Invoke(new()\n    {\n        Name = \"terraform/demo-role\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := akeyless.LookupRole(ctx, \u0026akeyless.LookupRoleArgs{\n\t\t\tName: \"terraform/demo-role\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.akeyless.AkeylessFunctions;\nimport com.pulumi.akeyless.inputs.GetRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var demo-role = AkeylessFunctions.getRole(GetRoleArgs.builder()\n            .name(\"terraform/demo-role\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  demo-role:\n    fn::invoke:\n      function: akeyless:getRole\n      arguments:\n        name: terraform/demo-role\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getRole.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"The Role name\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getRole.\n","properties":{"assocAuthMethodWithRules":{"type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"name":{"description":"The Role name\n","type":"string"}},"required":["assocAuthMethodWithRules","id","name"],"type":"object"}},"akeyless:index/getRotatedSecret:getRotatedSecret":{"description":"Get rotated secret value data source\n","inputs":{"description":"A collection of arguments for invoking getRotatedSecret.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"name":{"type":"string","description":"Secret name\n"},"version":{"type":"number","description":"Secret version\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getRotatedSecret.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"ignoreCache":{"description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n","type":"string"},"name":{"description":"Secret name\n","type":"string"},"value":{"description":"output\n","secret":true,"type":"string"},"version":{"description":"Secret version\n","type":"number"}},"required":["id","name","value"],"type":"object"}},"akeyless:index/getRsaPub:getRsaPub":{"description":"Obtain the public key from a specific RSA private key data source\n","inputs":{"description":"A collection of arguments for invoking getRsaPub.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Name of RSA key to extract the public key from\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getRsaPub.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"name":{"description":"Name of RSA key to extract the public key from\n","type":"string"},"raw":{"type":"string"},"ssh":{"type":"string"}},"required":["id","name","raw","ssh"],"type":"object"}},"akeyless:index/getSecret:getSecret":{"description":"Reads any secret data (currently support Static/Dynamic)\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as akeyless from \"@pulumi/akeyless\";\n\nconst secret = akeyless.getSecret({\n    path: \"terraform/MyFirstSecret\",\n});\n```\n```python\nimport pulumi\nimport pulumi_akeyless as akeyless\n\nsecret = akeyless.get_secret(path=\"terraform/MyFirstSecret\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Akeyless = Pulumi.Akeyless;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var secret = Akeyless.GetSecret.Invoke(new()\n    {\n        Path = \"terraform/MyFirstSecret\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := akeyless.GetSecret(ctx, \u0026akeyless.GetSecretArgs{\n\t\t\tPath: \"terraform/MyFirstSecret\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.akeyless.AkeylessFunctions;\nimport com.pulumi.akeyless.inputs.GetSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var secret = AkeylessFunctions.getSecret(GetSecretArgs.builder()\n            .path(\"terraform/MyFirstSecret\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  secret:\n    fn::invoke:\n      function: akeyless:getSecret\n      arguments:\n        path: terraform/MyFirstSecret\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecret.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"path":{"type":"string","description":"The path where the secret is stored\n"}},"type":"object","required":["path"]},"outputs":{"description":"A collection of values returned by getSecret.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"path":{"description":"The path where the secret is stored\n","type":"string"},"value":{"description":"The secret contents\n","secret":true,"type":"string"},"version":{"description":"The version of the secret.\n","type":"number"}},"required":["id","path","value","version"],"type":"object"}},"akeyless:index/getSshCertificate:getSshCertificate":{"description":"Generates SSH certificate data source\n","inputs":{"description":"A collection of arguments for invoking getSshCertificate.\n","properties":{"certIssuerName":{"type":"string","description":"The name of the SSH certificate issuer\n"},"certUsername":{"type":"string","description":"The username to sign in the SSH certificate (use a comma-separated list for more than one username)\n"},"id":{"type":"string","description":"The ID of this resource.\n"},"legacySigningAlgName":{"type":"boolean","description":"Set this option to output legacy ('ssh-rsa-cert-v01@openssh.com') signing algorithm name in the certificate.\n"},"publicKeyData":{"type":"string","description":"SSH public key file contents\n"},"ttl":{"type":"number","description":"Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)\n"}},"type":"object","required":["certIssuerName","certUsername","publicKeyData"]},"outputs":{"description":"A collection of values returned by getSshCertificate.\n","properties":{"certIssuerName":{"description":"The name of the SSH certificate issuer\n","type":"string"},"certUsername":{"description":"The username to sign in the SSH certificate (use a comma-separated list for more than one username)\n","type":"string"},"data":{"secret":true,"type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"legacySigningAlgName":{"description":"Set this option to output legacy ('ssh-rsa-cert-v01@openssh.com') signing algorithm name in the certificate.\n","type":"boolean"},"publicKeyData":{"description":"SSH public key file contents\n","type":"string"},"ttl":{"description":"Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)\n","type":"number"}},"required":["certIssuerName","certUsername","data","id","publicKeyData"],"type":"object"}},"akeyless:index/getStaticSecret:getStaticSecret":{"description":"Static secret data source\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as akeyless from \"@pulumi/akeyless\";\n\nconst secret = akeyless.getStaticSecret({\n    path: \"terraform/MyFirstSecret\",\n});\n```\n```python\nimport pulumi\nimport pulumi_akeyless as akeyless\n\nsecret = akeyless.get_static_secret(path=\"terraform/MyFirstSecret\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Akeyless = Pulumi.Akeyless;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var secret = Akeyless.GetStaticSecret.Invoke(new()\n    {\n        Path = \"terraform/MyFirstSecret\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/akeyless/akeyless\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := akeyless.LookupStaticSecret(ctx, \u0026akeyless.LookupStaticSecretArgs{\n\t\t\tPath: \"terraform/MyFirstSecret\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.akeyless.AkeylessFunctions;\nimport com.pulumi.akeyless.inputs.GetStaticSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var secret = AkeylessFunctions.getStaticSecret(GetStaticSecretArgs.builder()\n            .path(\"terraform/MyFirstSecret\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  secret:\n    fn::invoke:\n      function: akeyless:getStaticSecret\n      arguments:\n        path: terraform/MyFirstSecret\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getStaticSecret.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"ignoreCache":{"type":"string","description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n"},"path":{"type":"string","description":"The path where the secret is stored. Defaults to the latest version.\n"},"version":{"type":"number","description":"The version of the secret.\n"}},"type":"object","required":["path"]},"outputs":{"description":"A collection of values returned by getStaticSecret.\n","properties":{"customField":{"additionalProperties":{"type":"string"},"description":"Additional custom fields to associate with the item (e.g fieldName1=value1) (relevant only for type 'password')\n","secret":true,"type":"object"},"id":{"description":"The ID of this resource.\n","type":"string"},"ignoreCache":{"description":"Retrieve the Secret value without checking the Gateway's cache [true/false]\n","type":"string"},"injectUrls":{"description":"List of URLs associated with the item (relevant only for type 'password')\n","items":{"type":"string"},"type":"array"},"keyValuePairs":{"additionalProperties":{"type":"string"},"description":"The key value pairs for key/value secrets.\n","secret":true,"type":"object"},"password":{"description":"Password value (relevant only for type 'password')\n","secret":true,"type":"string"},"path":{"description":"The path where the secret is stored. Defaults to the latest version.\n","type":"string"},"username":{"description":"Username value (relevant only for type 'password')\n","type":"string"},"value":{"description":"The secret contents.\n","secret":true,"type":"string"},"version":{"description":"The version of the secret.\n","type":"number"}},"required":["customField","id","injectUrls","keyValuePairs","password","path","username","value","version"],"type":"object"}},"akeyless:index/getTags:getTags":{"description":"Get Auth Method details data source\n","inputs":{"description":"A collection of arguments for invoking getTags.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"The item name\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getTags.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"name":{"description":"The item name\n","type":"string"},"tags":{"items":{"type":"string"},"type":"array"}},"required":["id","name","tags"],"type":"object"}},"akeyless:index/getTarget:getTarget":{"description":"Get target data source\n","inputs":{"description":"A collection of arguments for invoking getTarget.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Target name\n"},"showVersions":{"type":"boolean","description":"Include all target versions in reply\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getTarget.\n","properties":{"clientPermissions":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"id":{"description":"The ID of this resource.\n","type":"string"},"lastVersion":{"type":"number"},"name":{"description":"Target name\n","type":"string"},"protectionKeyName":{"type":"string"},"showVersions":{"description":"Include all target versions in reply\n","type":"boolean"},"targetId":{"type":"number"},"targetItemsAssoc":{"type":"string"},"targetName":{"type":"string"},"targetType":{"type":"string"},"targetVersions":{"type":"string"},"withCustomerFragment":{"type":"boolean"}},"required":["clientPermissions","description","id","lastVersion","name","protectionKeyName","targetId","targetItemsAssoc","targetName","targetType","targetVersions","withCustomerFragment"],"type":"object"}},"akeyless:index/getTargetDetails:getTargetDetails":{"description":"Get target details data source\n","inputs":{"description":"A collection of arguments for invoking getTargetDetails.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"name":{"type":"string","description":"Target name\n"},"showVersions":{"type":"boolean","description":"Include all target versions in reply\n"},"targetVersion":{"type":"number","description":"Target version\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getTargetDetails.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"name":{"description":"Target name\n","type":"string"},"showVersions":{"description":"Include all target versions in reply\n","type":"boolean"},"targetVersion":{"description":"Target version\n","type":"number"},"value":{"additionalProperties":{"type":"string"},"type":"object"}},"required":["id","name","value"],"type":"object"}},"akeyless:index/getTokenize:getTokenize":{"description":"Encrypts text with a tokenizer data source\n","inputs":{"description":"A collection of arguments for invoking getTokenize.\n","properties":{"id":{"type":"string","description":"The ID of this resource.\n"},"plaintext":{"type":"string","description":"Data to be encrypted\n"},"tokenizerName":{"type":"string","description":"The name of the tokenizer to use in the encryption process\n"},"tweak":{"type":"string","description":"Base64 encoded tweak for vaultless encryption\n"}},"type":"object","required":["plaintext","tokenizerName"]},"outputs":{"description":"A collection of values returned by getTokenize.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"plaintext":{"description":"Data to be encrypted\n","type":"string"},"result":{"type":"string"},"tokenizerName":{"description":"The name of the tokenizer to use in the encryption process\n","type":"string"},"tweak":{"description":"Base64 encoded tweak for vaultless encryption\n","type":"string"}},"required":["id","plaintext","result","tokenizerName","tweak"],"type":"object"}},"pulumi:providers:akeyless/terraformConfig":{"description":"This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.","inputs":{"properties":{"__self__":{"$ref":"#/resources/pulumi:providers:akeyless"}},"type":"object","required":["__self__"]},"outputs":{"properties":{"result":{"additionalProperties":{"$ref":"pulumi.json#/Any"},"type":"object"}},"required":["result"],"type":"object"}}},"parameterization":{"baseProvider":{"name":"terraform-provider","version":"1.0.1"},"parameter":"eyJyZW1vdGUiOnsidXJsIjoicmVnaXN0cnkub3BlbnRvZnUub3JnL2FrZXlsZXNzLWNvbW11bml0eS9ha2V5bGVzcyIsInZlcnNpb24iOiIxLjExLjYifX0="}}