Apply automatic changes

This commit is contained in:
tyler-mairose-sp
2024-04-12 12:33:14 +00:00
committed by github-actions[bot]
parent 2e12377390
commit 3b62db16c9
7 changed files with 18382 additions and 18383 deletions

View File

@@ -6101,7 +6101,7 @@
"tags": [
"Access Profiles"
],
"description": "This API initiates a bulk deletion of one or more Access Profiles.\n\nBy default, if any of the indicated Access Profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated Access Profiles will be deleted.\n\nA token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this API. In addition, a SOURCE_SUBADMIN may only use this API to delete Access Profiles which are associated with Sources they are able to administer.",
"description": "This endpoint initiates a bulk deletion of one or more access profiles.\nWhen the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information. \nThis endpoint can only bulk delete up to a limit of 50 access profiles per request. \nBy default, if any of the indicated access profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated access profiles will be deleted.\nA token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this endpoint. In addition, a SOURCE_SUBADMIN can only use this endpoint to delete access profiles associated with sources they're able to administer.",
"requestBody": {
"required": true,
"content": {
@@ -163098,12 +163098,12 @@
},
"/roles/bulk-delete": {
"post": {
"operationId": "bulkDeleteRoles",
"operationId": "deleteBulkRoles",
"summary": "Delete Role(s)",
"tags": [
"Roles"
],
"description": "This API initiates a bulk deletion of one or more Roles.\n\nA token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this API. In addition, a token with ROLE_SUBADMIN authority may only call this API if all Roles included in the request are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.",
"description": "This endpoint initiates a bulk deletion of one or more roles.\nWhen the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information. \nThis endpoint can only bulk delete up to a limit of 50 roles per request. \nA token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this endpoint. In addition, a token with ROLE_SUBADMIN authority can only call this endpoint if all roles included in the request are associated with sources with management workgroups the ROLE_SUBADMIN is a member of.",
"requestBody": {
"required": true,
"content": {
@@ -232183,7 +232183,7 @@
"post": {
"operationId": "createSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Create SOD policy",
"deprecated": true,
@@ -233282,7 +233282,7 @@
"get": {
"operationId": "listSodPolicies",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "List SOD policies",
"deprecated": true,
@@ -234054,7 +234054,7 @@
"get": {
"operationId": "getSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Get SOD policy by ID",
"deprecated": true,
@@ -234887,7 +234887,7 @@
"put": {
"operationId": "putSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Update SOD policy by ID",
"deprecated": true,
@@ -236106,7 +236106,7 @@
"delete": {
"operationId": "deleteSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Delete SOD policy by ID",
"deprecated": true,
@@ -236566,7 +236566,7 @@
"patch": {
"operationId": "patchSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Patch a SOD policy",
"deprecated": true,
@@ -237449,7 +237449,7 @@
"get": {
"operationId": "getSodPolicySchedule",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Get SOD policy schedule",
"deprecated": true,
@@ -238062,7 +238062,7 @@
"put": {
"operationId": "putPolicySchedule",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Update SOD Policy schedule",
"deprecated": true,
@@ -238942,7 +238942,7 @@
"delete": {
"operationId": "deleteSodPolicySchedule",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Delete SOD policy schedule",
"deprecated": true,
@@ -239393,7 +239393,7 @@
"post": {
"operationId": "startSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Runs SOD policy violation report",
"deprecated": true,
@@ -239900,7 +239900,7 @@
"get": {
"operationId": "getSodViolationReportStatus",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Get SOD violation report status",
"deprecated": true,

View File

@@ -5505,11 +5505,11 @@ paths:
tags:
- Access Profiles
description: |-
This API initiates a bulk deletion of one or more Access Profiles.
By default, if any of the indicated Access Profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated Access Profiles will be deleted.
A token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this API. In addition, a SOURCE_SUBADMIN may only use this API to delete Access Profiles which are associated with Sources they are able to administer.
This endpoint initiates a bulk deletion of one or more access profiles.
When the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information.
This endpoint can only bulk delete up to a limit of 50 access profiles per request.
By default, if any of the indicated access profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated access profiles will be deleted.
A token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this endpoint. In addition, a SOURCE_SUBADMIN can only use this endpoint to delete access profiles associated with sources they're able to administer.
requestBody:
required: true
content:
@@ -121853,14 +121853,15 @@ paths:
- 'idn:role-checked:manage'
/roles/bulk-delete:
post:
operationId: bulkDeleteRoles
operationId: deleteBulkRoles
summary: Delete Role(s)
tags:
- Roles
description: |-
This API initiates a bulk deletion of one or more Roles.
A token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this API. In addition, a token with ROLE_SUBADMIN authority may only call this API if all Roles included in the request are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
This endpoint initiates a bulk deletion of one or more roles.
When the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information.
This endpoint can only bulk delete up to a limit of 50 roles per request.
A token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this endpoint. In addition, a token with ROLE_SUBADMIN authority can only call this endpoint if all roles included in the request are associated with sources with management workgroups the ROLE_SUBADMIN is a member of.
requestBody:
required: true
content:
@@ -175314,7 +175315,7 @@ paths:
post:
operationId: createSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Create SOD policy
deprecated: true
security:
@@ -176117,7 +176118,7 @@ paths:
get:
operationId: listSodPolicies
tags:
- SOD Policy
- SOD Policies
summary: List SOD policies
deprecated: true
security:
@@ -176698,7 +176699,7 @@ paths:
get:
operationId: getSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Get SOD policy by ID
deprecated: true
security:
@@ -177306,7 +177307,7 @@ paths:
put:
operationId: putSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Update SOD policy by ID
deprecated: true
security:
@@ -178198,7 +178199,7 @@ paths:
delete:
operationId: deleteSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Delete SOD policy by ID
deprecated: true
security:
@@ -178531,7 +178532,7 @@ paths:
patch:
operationId: patchSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Patch a SOD policy
deprecated: true
security:
@@ -179183,7 +179184,7 @@ paths:
get:
operationId: getSodPolicySchedule
tags:
- SOD Policy
- SOD Policies
summary: Get SOD policy schedule
deprecated: true
security:
@@ -179662,7 +179663,7 @@ paths:
put:
operationId: putPolicySchedule
tags:
- SOD Policy
- SOD Policies
summary: Update SOD Policy schedule
deprecated: true
security:
@@ -180370,7 +180371,7 @@ paths:
delete:
operationId: deleteSodPolicySchedule
tags:
- SOD Policy
- SOD Policies
summary: Delete SOD policy schedule
deprecated: true
security:
@@ -180696,7 +180697,7 @@ paths:
post:
operationId: startSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Runs SOD policy violation report
deprecated: true
security:
@@ -181061,7 +181062,7 @@ paths:
get:
operationId: getSodViolationReportStatus
tags:
- SOD Policy
- SOD Policies
summary: Get SOD violation report status
deprecated: true
security:

View File

@@ -4106,7 +4106,7 @@
"tags": [
"Access Profiles"
],
"description": "This API initiates a bulk deletion of one or more Access Profiles.\n\nBy default, if any of the indicated Access Profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated Access Profiles will be deleted.\n\nA token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this API. In addition, a SOURCE_SUBADMIN may only use this API to delete Access Profiles which are associated with Sources they are able to administer.",
"description": "This endpoint initiates a bulk deletion of one or more access profiles.\nWhen the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information. \nThis endpoint can only bulk delete up to a limit of 50 access profiles per request. \nBy default, if any of the indicated access profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated access profiles will be deleted.\nA token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this endpoint. In addition, a SOURCE_SUBADMIN can only use this endpoint to delete access profiles associated with sources they're able to administer.",
"requestBody": {
"required": true,
"content": {
@@ -21611,7 +21611,7 @@
"get": {
"operationId": "getAuthUser",
"tags": [
"Auth User"
"Auth Users"
],
"summary": "Auth User Details",
"description": "Return the specified user's authentication system details.",
@@ -22181,7 +22181,7 @@
"patch": {
"operationId": "patchAuthUser",
"tags": [
"Auth User"
"Auth Users"
],
"summary": "Auth User Update",
"description": "Use a PATCH request to update an existing user in the authentication system.\nUse this endpoint to modify these fields: \n * `capabilities`\n\nA '400.1.1 Illegal update attempt' detail code indicates that you attempted to PATCH a field that is not allowed.",
@@ -103257,7 +103257,7 @@
"tags": [
"Roles"
],
"description": "This API initiates a bulk deletion of one or more Roles.\n\nA token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this API. In addition, a token with ROLE_SUBADMIN authority may only call this API if all Roles included in the request are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.",
"description": "This endpoint initiates a bulk deletion of one or more roles.\nWhen the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information. \nThis endpoint can only bulk delete up to a limit of 50 roles per request. \nA token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this endpoint. In addition, a token with ROLE_SUBADMIN authority can only call this endpoint if all roles included in the request are associated with sources with management workgroups the ROLE_SUBADMIN is a member of.",
"requestBody": {
"required": true,
"content": {
@@ -140670,7 +140670,7 @@
],
"operationId": "createSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Create SOD policy",
"description": "This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy.\nRequires role of ORG_ADMIN.",
@@ -141776,7 +141776,7 @@
],
"operationId": "listSodPolicies",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "List SOD policies",
"description": "This gets list of all SOD policies.\nRequires role of ORG_ADMIN",
@@ -142551,7 +142551,7 @@
],
"operationId": "getSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Get SOD policy by ID",
"description": "This gets specified SOD policy.\nRequires role of ORG_ADMIN.",
@@ -143387,7 +143387,7 @@
],
"operationId": "putSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Update SOD policy by ID",
"description": "This updates a specified SOD policy.\nRequires role of ORG_ADMIN.",
@@ -144603,7 +144603,7 @@
],
"operationId": "deleteSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Delete SOD policy by ID",
"description": "This deletes a specified SOD policy.\nRequires role of ORG_ADMIN.",
@@ -145062,7 +145062,7 @@
],
"operationId": "patchSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Patch SOD policy by ID",
"description": "Allows updating SOD Policy fields other than [\"id\",\"created\",\"creatorId\",\"policyQuery\",\"type\"] using the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard.\nRequires role of ORG_ADMIN.\nThis endpoint can only patch CONFLICTING_ACCESS_BASED type policies. Do not use this endpoint to patch general policies - doing so will build an API exception. ",
@@ -146020,7 +146020,7 @@
],
"operationId": "startEvaluateSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Evaluate one policy by ID",
"description": "Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.",
@@ -146426,7 +146426,7 @@
],
"operationId": "getSodPolicySchedule",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Get SOD policy schedule",
"description": "This endpoint gets a specified SOD policy's schedule.",
@@ -147043,7 +147043,7 @@
],
"operationId": "putPolicySchedule",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Update SOD Policy schedule",
"description": "This updates schedule for a specified SOD policy.",
@@ -147932,7 +147932,7 @@
],
"operationId": "deleteSodPolicySchedule",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Delete SOD policy schedule",
"description": "This deletes schedule for a specified SOD policy by ID.",
@@ -148382,7 +148382,7 @@
],
"operationId": "startSodPolicy",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Runs SOD policy violation report",
"description": "This invokes processing of violation report for given SOD policy. If the policy reports more than 5000 violations, the report returns with violation limit exceeded message.",
@@ -148888,7 +148888,7 @@
],
"operationId": "getSodViolationReportStatus",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Get SOD violation report status",
"description": "This gets the status for a violation report run task that has already been invoked.",
@@ -149394,7 +149394,7 @@
],
"operationId": "getSodViolationReportRunStatus",
"tags": [
"SOD Policy"
"SOD Policies"
],
"summary": "Get violation report run status",
"description": "This gets the status for a violation report run task that has already been invoked.",

View File

@@ -3980,11 +3980,11 @@ paths:
tags:
- Access Profiles
description: |-
This API initiates a bulk deletion of one or more Access Profiles.
By default, if any of the indicated Access Profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated Access Profiles will be deleted.
A token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this API. In addition, a SOURCE_SUBADMIN may only use this API to delete Access Profiles which are associated with Sources they are able to administer.
This endpoint initiates a bulk deletion of one or more access profiles.
When the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information.
This endpoint can only bulk delete up to a limit of 50 access profiles per request.
By default, if any of the indicated access profiles are in use, no deletions will be performed and the **inUse** field of the response indicates the usages that must be removed first. If the request field **bestEffortOnly** is **true**, however, usages are reported in the **inUse** response field but all other indicated access profiles will be deleted.
A token with API, ORG_ADMIN, SOURCE_ADMIN, or SOURCE_SUBADMIN authority is required to call this endpoint. In addition, a SOURCE_SUBADMIN can only use this endpoint to delete access profiles associated with sources they're able to administer.
requestBody:
required: true
content:
@@ -17101,7 +17101,7 @@ paths:
get:
operationId: getAuthUser
tags:
- Auth User
- Auth Users
summary: Auth User Details
description: Return the specified user's authentication system details.
parameters:
@@ -17522,7 +17522,7 @@ paths:
patch:
operationId: patchAuthUser
tags:
- Auth User
- Auth Users
summary: Auth User Update
description: |-
Use a PATCH request to update an existing user in the authentication system.
@@ -78109,9 +78109,10 @@ paths:
tags:
- Roles
description: |-
This API initiates a bulk deletion of one or more Roles.
A token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this API. In addition, a token with ROLE_SUBADMIN authority may only call this API if all Roles included in the request are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
This endpoint initiates a bulk deletion of one or more roles.
When the request is successful, the endpoint returns the bulk delete's task result ID. To follow the task, you can use [Get Task Status by ID](https://developer.sailpoint.com/docs/api/beta/get-task-status), which will return the task result's status and information.
This endpoint can only bulk delete up to a limit of 50 roles per request.
A token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call this endpoint. In addition, a token with ROLE_SUBADMIN authority can only call this endpoint if all roles included in the request are associated with sources with management workgroups the ROLE_SUBADMIN is a member of.
requestBody:
required: true
content:
@@ -106262,7 +106263,7 @@ paths:
- 'idn:sod-policy:write'
operationId: createSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Create SOD policy
description: |-
This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy.
@@ -107072,7 +107073,7 @@ paths:
- 'idn:sod-policy:read'
operationId: listSodPolicies
tags:
- SOD Policy
- SOD Policies
summary: List SOD policies
description: |-
This gets list of all SOD policies.
@@ -107656,7 +107657,7 @@ paths:
- 'idn:sod-policy:read'
operationId: getSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Get SOD policy by ID
description: |-
This gets specified SOD policy.
@@ -108267,7 +108268,7 @@ paths:
- 'idn:sod-policy:write'
operationId: putSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Update SOD policy by ID
description: |-
This updates a specified SOD policy.
@@ -109157,7 +109158,7 @@ paths:
- 'idn:sod-policy:write'
operationId: deleteSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Delete SOD policy by ID
description: |-
This deletes a specified SOD policy.
@@ -109489,7 +109490,7 @@ paths:
- 'idn:sod-policy:write'
operationId: patchSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Patch SOD policy by ID
description: |-
Allows updating SOD Policy fields other than ["id","created","creatorId","policyQuery","type"] using the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard.
@@ -110190,7 +110191,7 @@ paths:
- 'idn:sod-violation:write'
operationId: startEvaluateSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Evaluate one policy by ID
description: Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.
parameters:
@@ -110479,7 +110480,7 @@ paths:
- 'idn:sod-policy:read'
operationId: getSodPolicySchedule
tags:
- SOD Policy
- SOD Policies
summary: Get SOD policy schedule
description: This endpoint gets a specified SOD policy's schedule.
parameters:
@@ -110960,7 +110961,7 @@ paths:
- 'idn:sod-policy:write'
operationId: putPolicySchedule
tags:
- SOD Policy
- SOD Policies
summary: Update SOD Policy schedule
description: This updates schedule for a specified SOD policy.
parameters:
@@ -111675,7 +111676,7 @@ paths:
- 'idn:sod-policy:write'
operationId: deleteSodPolicySchedule
tags:
- SOD Policy
- SOD Policies
summary: Delete SOD policy schedule
description: This deletes schedule for a specified SOD policy by ID.
parameters:
@@ -111998,7 +111999,7 @@ paths:
- 'idn:sod-violation:write'
operationId: startSodPolicy
tags:
- SOD Policy
- SOD Policies
summary: Runs SOD policy violation report
description: 'This invokes processing of violation report for given SOD policy. If the policy reports more than 5000 violations, the report returns with violation limit exceeded message.'
parameters:
@@ -112360,7 +112361,7 @@ paths:
- 'idn:sod-violation:read'
operationId: getSodViolationReportStatus
tags:
- SOD Policy
- SOD Policies
summary: Get SOD violation report status
description: This gets the status for a violation report run task that has already been invoked.
parameters:
@@ -112722,7 +112723,7 @@ paths:
- 'idn:sod-violation:read'
operationId: getSodViolationReportRunStatus
tags:
- SOD Policy
- SOD Policies
summary: Get violation report run status
description: This gets the status for a violation report run task that has already been invoked.
parameters:

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long