Skip to content

Latest commit

 

History

History
40 lines (36 loc) · 3.64 KB

File metadata and controls

40 lines (36 loc) · 3.64 KB

akeyless.Model.UpdateSSHCertIssuer

Properties

Name Type Description Notes
ProviderType string [optional]
AddTag List<string> List of the new tags that will be attached to this item [optional]
AllowedUsers string Users allowed to fetch the certificate, e.g root,ubuntu [default to "-"]
DeleteProtection string Protection from accidental deletion of this object [true/false] [optional]
Description string Description of the object [optional]
Extensions Dictionary<string, string> Signed certificates with extensions, e.g permit-port-forwarding=\&quot;\&quot; [optional]
ExternalUsername string Externally provided username [true/false] [optional] [default to "false"]
FixedUserClaimKeyname string For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true) [optional]
HostProvider string Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret [optional]
ItemCustomFields Dictionary<string, string> Additional custom fields to associate with the item [optional]
Json bool Set output format to JSON [optional] [default to false]
Metadata string Deprecated - use description [optional]
Name string SSH certificate issuer name
NewName string New item name [optional]
Principals string Signed certificates with principal, e.g example_role1,example_role2 [optional]
RmTag List<string> List of the existent tags that will be removed from this item [optional]
SecureAccessApi string Secure Access SSH control API endpoint. E.g. https://my.sra-server:9900 [optional]
SecureAccessBastionApi string Deprecated. use secure-access-api [optional]
SecureAccessBastionSsh string Deprecated. use secure-access-ssh [optional]
SecureAccessEnable string Enable/Disable secure remote access [true/false] [optional]
SecureAccessEnforceHostsRestriction bool Enable this flag to enforce connections only to the hosts listed in - -secure-access-host [optional]
SecureAccessGateway string [optional]
SecureAccessHost List<string> Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) [optional]
SecureAccessSsh string Bastion's SSH server. E.g. my.sra-server:22 [optional]
SecureAccessSshCredsUser string SSH username to connect to target server, must be in 'Allowed Users' list [optional]
SecureAccessUseInternalBastion bool Deprecated. Use secure-access-use-internal-ssh-access [optional]
SecureAccessUseInternalSshAccess bool Use internal SSH Access [optional]
SignerKeyName string A key to sign the certificate with
Token string Authentication token (see `/auth` and `/configure`) [optional]
Ttl long The requested Time To Live for the certificate, in seconds
UidToken string The universal identity token, Required only for universal_identity authentication [optional]

[Back to Model list] [Back to API list] [Back to README]