You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**debug** | **Boolean** | Debug mode | [optional][default to false]
8
+
**expirationEventIn** | **[String]** | How many days before the expiration of the certificate would you like to be notified. | [optional]
9
+
**hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to discovery |
10
+
**json** | **Boolean** | Set output format to JSON | [optional][default to false]
11
+
**portRanges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443']
12
+
**protectionKey** | **String** | The name of the key that protects the certificate value | [optional]
13
+
**targetLocation** | **String** | The folder where the results will be saved |
14
+
**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional]
15
+
**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional]
**analyticsAccess** | **String** | Allow this role to view analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional]
8
-
**auditAccess** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional]
8
+
**auditAccess** | **String** | Allow this role to view audit logs. Currently only 'none', 'own', 'scoped' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional]
9
9
**comment** | **String** | Deprecated - use description | [optional]
10
10
**deleteProtection** | **String** | Protection from accidental deletion of this object [true/false] | [optional]
11
11
**description** | **String** | Description of the object | [optional]
12
-
**eventCenterAccess** | **String** | Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported | [optional]
12
+
**eventCenterAccess** | **String** | Allow this role to view Event Center. Currently only 'none', 'scoped' and 'all' values are supported | [optional]
13
13
**eventForwardersAccess** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional]
14
14
**eventForwardersName** | **[String]** | Allow this role to manage the following Event Forwarders. | [optional]
15
-
**gwAnalyticsAccess** | **String** | Allow this role to view gw analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional]
15
+
**gwAnalyticsAccess** | **String** | Allow this role to view gw analytics. Currently only 'none', 'scoped', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional]
16
16
**json** | **Boolean** | Set output format to JSON | [optional][default to false]
17
17
**name** | **String** | Role name |
18
-
**reverseRbacAccess** | **String** | Allow this role to view Reverse RBAC. Supported values: 'own', 'all'. | [optional]
19
-
**sraReportsAccess** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'own', 'all' values are supported. | [optional]
18
+
**reverseRbacAccess** | **String** | Allow this role to view Reverse RBAC. Supported values: 'scoped', 'all'. | [optional]
19
+
**sraReportsAccess** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'scoped', 'all' values are supported. | [optional]
20
20
**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional]
21
21
**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional]
22
22
**usageReportsAccess** | **String** | Allow this role to view Usage Report. Currently only 'none' and 'all' values are supported. | [optional]
Copy file name to clipboardExpand all lines: docs/GatewayCreateMigration.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,11 +35,13 @@ Name | Type | Description | Notes
35
35
**azureKvName** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional]
36
36
**azureSecret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional]
37
37
**azureTenantId** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional]
38
+
**expirationEventIn** | **[String]** | How many days before the expiration of the certificate would you like to be notified. | [optional]
38
39
**gcpKey** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional]
39
40
**hashiJson** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true']
40
41
**hashiNs** | **[String]** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional]
41
42
**hashiToken** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional]
42
43
**hashiUrl** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional]
44
+
**hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan |
43
45
**json** | **Boolean** | Set output format to JSON | [optional][default to false]
44
46
**k8sCaCertificate** | **[Number]** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional]
45
47
**k8sClientCertificate** | **[Number]** | K8s Client certificate with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Certificate Authentication method) | [optional]
@@ -51,6 +53,7 @@ Name | Type | Description | Notes
51
53
**k8sUrl** | **String** | K8s API Server URL, e.g. https://k8s-api.mycompany.com:6443 (relevant only for K8s migration) | [optional]
52
54
**k8sUsername** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional]
53
55
**name** | **String** | Migration name |
56
+
**portRanges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443']
54
57
**protectionKey** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional]
55
58
**siAutoRotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional]
56
59
**siRotationHour** | **Number** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional]
@@ -62,7 +65,7 @@ Name | Type | Description | Notes
62
65
**siUsersPathTemplate** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) |
63
66
**targetLocation** | **String** | Target location in Akeyless for imported secrets |
64
67
**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional]
65
-
**type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory) | [optional]
68
+
**type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory/server_inventory/certificate) | [optional]
66
69
**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional]
Copy file name to clipboardExpand all lines: docs/GatewayUpdateMigration.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,11 +35,13 @@ Name | Type | Description | Notes
35
35
**azureKvName** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional]
36
36
**azureSecret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional]
37
37
**azureTenantId** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional]
38
+
**expirationEventIn** | **[String]** | How many days before the expiration of the certificate would you like to be notified. | [optional]
38
39
**gcpKey** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional]
39
40
**hashiJson** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true']
40
41
**hashiNs** | **[String]** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional]
41
42
**hashiToken** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional]
42
43
**hashiUrl** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional]
44
+
**hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan |
43
45
**id** | **String** | Migration ID (Can be retrieved with gateway-list-migration command) | [optional]
44
46
**json** | **Boolean** | Set output format to JSON | [optional][default to false]
45
47
**k8sCaCertificate** | **[Number]** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional]
@@ -53,6 +55,7 @@ Name | Type | Description | Notes
53
55
**k8sUsername** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional]
54
56
**name** | **String** | Migration name | [optional]
55
57
**newName** | **String** | New migration name | [optional]
58
+
**portRanges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443']
56
59
**protectionKey** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional]
57
60
**siAutoRotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional]
58
61
**siRotationHour** | **Number** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional]
0 commit comments