Skip to content

Latest commit

 

History

History
24 lines (20 loc) · 2.35 KB

CreateAuthMethodLDAP.md

File metadata and controls

24 lines (20 loc) · 2.35 KB

akeyless.CreateAuthMethodLDAP

Properties

Name Type Description Notes
accessExpires Number Access expiration date in Unix timestamp (select 0 for access without expiry date) [optional] [default to 0]
auditLogsClaims [String] Subclaims to include in audit logs, e.g "--audit-logs-claims email --audit-logs-claims username" [optional]
boundIps [String] A CIDR whitelist with the IPs that the access is restricted to [optional]
deleteProtection String Protection from accidental deletion of this object [true/false] [optional]
description String Auth Method description [optional]
forceSubClaims Boolean if true: enforce role-association must include sub claims [optional]
genKey String Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided [true/false] [optional] [default to 'true']
gwBoundIps [String] A CIDR whitelist with the GW IPs that the access is restricted to [optional]
json Boolean Set output format to JSON [optional] [default to false]
jwtTtl Number Jwt TTL [optional] [default to 0]
name String Auth Method name
productType [String] Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] [optional]
publicKeyData String A public key generated for LDAP authentication method on Akeyless in base64 or PEM format [RSA2048] [optional]
token String Authentication token (see `/auth` and `/configure`) [optional]
uidToken String The universal identity token, Required only for universal_identity authentication [optional]
uniqueIdentifier String A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a "sub claim" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization. [optional] [default to 'users']