Skip to content

Commit

Permalink
Apply automatic changes
Browse files Browse the repository at this point in the history
  • Loading branch information
tyler-mairose-sp authored and github-actions[bot] committed Dec 13, 2024
1 parent ef1dbae commit 2776fd9
Show file tree
Hide file tree
Showing 10 changed files with 17,129 additions and 15,060 deletions.
44 changes: 40 additions & 4 deletions dereferenced/deref-sailpoint-api.beta.json
Original file line number Diff line number Diff line change
Expand Up @@ -178946,13 +178946,18 @@
},
"security": [
{
"UserContextAuth": [
"userAuth": [
"idn:role-unchecked:read",
"idn:role-unchecked:manage",
"idn:role-checked:manage",
"idn:role-checked:read"
]
}
],
"x-sailpoint-userLevels": [
"ORG_ADMIN",
"ROLE_ADMIN",
"ROLE_SUBADMIN"
]
},
"post": {
Expand Down Expand Up @@ -180630,11 +180635,16 @@
},
"security": [
{
"UserContextAuth": [
"userAuth": [
"idn:role-unchecked:manage",
"idn:role-checked:manage"
]
}
],
"x-sailpoint-userLevels": [
"ORG_ADMIN",
"ROLE_ADMIN",
"ROLE_SUBADMIN"
]
}
},
Expand Down Expand Up @@ -181672,7 +181682,7 @@
"Roles"
],
"summary": "Patch a specified Role",
"description": "This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.\n\nThe following fields are patchable:\n\n* name\n* description\n* enabled\n* owner\n* accessProfiles\n* membership\n* requestable\n* accessRequestConfig\n* revokeRequestConfig\n* segments\n* accessModelMetadata \nA token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this API. In addition, a token with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.\n\nThe maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters.\n\nWhen you use this API to modify a role's membership identities, you can only modify up to a limit of 500 membership identities at a time. ",
"description": "This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.\n\nThe following fields are patchable:\n\n* name\n* description\n* enabled\n* owner\n* accessProfiles\n* entitlements\n* membership\n* requestable\n* accessRequestConfig\n* revokeRequestConfig\n* segments\n* accessModelMetadata \nA token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this API. In addition, a token with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.\n\nThe maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters.\n\nWhen you use this API to modify a role's membership identities, you can only modify up to a limit of 500 membership identities at a time. ",
"parameters": [
{
"name": "id",
Expand Down Expand Up @@ -181860,7 +181870,7 @@
}
]
},
"Assign a Access Model Metadata to a role": {
"Assign a Access Model Metadata to a Role": {
"description": "This example shows how to assign a existing metadata to a role.",
"value": [
{
Expand All @@ -181886,6 +181896,32 @@
"value": true
}
]
},
"Add an Access Profile to a Role": {
"description": "This example shows how to add an access profile to a role.",
"value": [
{
"op": "add",
"path": "/accessProfiles/-",
"value": {
"id": "1de104e1f9024b1289b3a31e22d28cd1",
"type": "ACCESS_PROFILE"
}
}
]
},
"Add an Entitlement to a Role": {
"description": "This example shows how to add an entitlement to a role.",
"value": [
{
"op": "add",
"path": "/entitlements/-",
"value": {
"id": "0fb2f8051e48421b8f1f8a64aee3b205",
"type": "ENTITLEMENT"
}
}
]
}
}
}
Expand Down
31 changes: 28 additions & 3 deletions dereferenced/deref-sailpoint-api.beta.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -133746,11 +133746,15 @@ paths:
localeOrigin: DEFAULT
text: An internal fault occurred.
security:
- UserContextAuth:
- userAuth:
- 'idn:role-unchecked:read'
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
- ROLE_SUBADMIN
post:
operationId: createRole
tags:
Expand Down Expand Up @@ -135081,9 +135085,13 @@ paths:
localeOrigin: DEFAULT
text: An internal fault occurred.
security:
- UserContextAuth:
- userAuth:
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
- ROLE_SUBADMIN
'/roles/{id}':
get:
operationId: getRole
Expand Down Expand Up @@ -135899,6 +135907,7 @@ paths:
* enabled
* owner
* accessProfiles
* entitlements
* membership
* requestable
* accessRequestConfig
Expand Down Expand Up @@ -136027,7 +136036,7 @@ paths:
type: IDENTITY
property: attribute.email
stringValue: '@identitynow.com'
Assign a Access Model Metadata to a role:
Assign a Access Model Metadata to a Role:
description: This example shows how to assign a existing metadata to a role.
value:
- op: add
Expand All @@ -136042,6 +136051,22 @@ paths:
- op: replace
path: /dimensional
value: true
Add an Access Profile to a Role:
description: This example shows how to add an access profile to a role.
value:
- op: add
path: /accessProfiles/-
value:
id: 1de104e1f9024b1289b3a31e22d28cd1
type: ACCESS_PROFILE
Add an Entitlement to a Role:
description: This example shows how to add an entitlement to a role.
value:
- op: add
path: /entitlements/-
value:
id: 0fb2f8051e48421b8f1f8a64aee3b205
type: ENTITLEMENT
required: true
responses:
'200':
Expand Down
70 changes: 28 additions & 42 deletions dereferenced/deref-sailpoint-api.v2024.
Original file line number Diff line number Diff line change
Expand Up @@ -124210,14 +124210,6 @@
"idn:role-checked:manage",
"idn:role-checked:read"
]
},
{
"applicationAuth": [
"idn:role-unchecked:read",
"idn:role-unchecked:manage",
"idn:role-checked:manage",
"idn:role-checked:read"
]
}
],
"x-sailpoint-userLevels": [
Expand Down Expand Up @@ -125905,14 +125897,6 @@
"idn:role-unchecked:manage",
"idn:role-checked:manage"
]
},
{
"applicationAuth": [
"idn:role-unchecked:read",
"idn:role-unchecked:manage",
"idn:role-checked:manage",
"idn:role-checked:read"
]
}
],
"x-sailpoint-userLevels": [
Expand Down Expand Up @@ -126942,14 +126926,6 @@
"idn:role-checked:manage",
"idn:role-checked:read"
]
},
{
"applicationAuth": [
"idn:role-unchecked:read",
"idn:role-unchecked:manage",
"idn:role-checked:manage",
"idn:role-checked:read"
]
}
],
"x-sailpoint-userLevels": [
Expand All @@ -126964,7 +126940,7 @@
"Roles"
],
"summary": "Patch a specified Role",
"description": "This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.\nThe following fields are patchable:\n* name\n* description\n* enabled\n* owner\n* accessProfiles\n* membership\n* requestable\n* accessRequestConfig\n* revokeRequestConfig\n* segments\n* accessModelMetadata\n\nA user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.\n\nThe maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters.\n\nWhen you use this API to modify a role's membership identities, you can only modify up to a limit of 500 membership identities at a time. ",
"description": "This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.\nThe following fields are patchable:\n* name\n* description\n* enabled\n* owner\n* accessProfiles\n* entitlements\n* membership\n* requestable\n* accessRequestConfig\n* revokeRequestConfig\n* segments\n* accessModelMetadata\n\nA user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.\n\nThe maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters.\n\nWhen you use this API to modify a role's membership identities, you can only modify up to a limit of 500 membership identities at a time. ",
"parameters": [
{
"name": "id",
Expand Down Expand Up @@ -127152,7 +127128,7 @@
}
]
},
"Assign a Access Model Metadata to a role": {
"Assign a Access Model Metadata to a Role": {
"description": "This example shows how to assign a existing metadata to a role.",
"value": [
{
Expand All @@ -127168,6 +127144,32 @@
}
}
]
},
"Add an Access Profile to a Role": {
"description": "This example shows how to add an access profile to a role.",
"value": [
{
"op": "add",
"path": "/accessProfiles/-",
"value": {
"id": "1de104e1f9024b1289b3a31e22d28cd1",
"type": "ACCESS_PROFILE"
}
}
]
},
"Add an Entitlement to a Role": {
"description": "This example shows how to add an entitlement to a role.",
"value": [
{
"op": "add",
"path": "/entitlements/-",
"value": {
"id": "0fb2f8051e48421b8f1f8a64aee3b205",
"type": "ENTITLEMENT"
}
}
]
}
}
}
Expand Down Expand Up @@ -128172,14 +128174,6 @@
"idn:role-unchecked:manage",
"idn:role-checked:manage"
]
},
{
"applicationAuth": [
"idn:role-unchecked:read",
"idn:role-unchecked:manage",
"idn:role-checked:manage",
"idn:role-checked:read"
]
}
],
"x-sailpoint-userLevels": [
Expand Down Expand Up @@ -128534,14 +128528,6 @@
"idn:role-unchecked:manage",
"idn:role-checked:manage"
]
},
{
"applicationAuth": [
"idn:role-unchecked:read",
"idn:role-unchecked:manage",
"idn:role-checked:manage",
"idn:role-checked:read"
]
}
],
"x-sailpoint-userLevels": [
Expand Down
44 changes: 18 additions & 26 deletions dereferenced/deref-sailpoint-api.v2024.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -93932,11 +93932,6 @@ paths:
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
- applicationAuth:
- 'idn:role-unchecked:read'
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
Expand Down Expand Up @@ -95271,11 +95266,6 @@ paths:
- userAuth:
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- applicationAuth:
- 'idn:role-unchecked:read'
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
Expand Down Expand Up @@ -96076,11 +96066,6 @@ paths:
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
- applicationAuth:
- 'idn:role-unchecked:read'
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
Expand All @@ -96098,6 +96083,7 @@ paths:
* enabled
* owner
* accessProfiles
* entitlements
* membership
* requestable
* accessRequestConfig
Expand Down Expand Up @@ -96227,7 +96213,7 @@ paths:
type: IDENTITY
property: attribute.email
stringValue: '@identitynow.com'
Assign a Access Model Metadata to a role:
Assign a Access Model Metadata to a Role:
description: This example shows how to assign a existing metadata to a role.
value:
- op: add
Expand All @@ -96236,6 +96222,22 @@ paths:
key: iscFederalClassifications
values:
- value: secret
Add an Access Profile to a Role:
description: This example shows how to add an access profile to a role.
value:
- op: add
path: /accessProfiles/-
value:
id: 1de104e1f9024b1289b3a31e22d28cd1
type: ACCESS_PROFILE
Add an Entitlement to a Role:
description: This example shows how to add an entitlement to a role.
value:
- op: add
path: /entitlements/-
value:
id: 0fb2f8051e48421b8f1f8a64aee3b205
type: ENTITLEMENT
required: true
responses:
'200':
Expand Down Expand Up @@ -97014,11 +97016,6 @@ paths:
- userAuth:
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- applicationAuth:
- 'idn:role-unchecked:read'
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
Expand Down Expand Up @@ -97276,11 +97273,6 @@ paths:
- userAuth:
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- applicationAuth:
- 'idn:role-unchecked:read'
- 'idn:role-unchecked:manage'
- 'idn:role-checked:manage'
- 'idn:role-checked:read'
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
Expand Down
Loading

0 comments on commit 2776fd9

Please sign in to comment.