authMethodCreateLdap is a command that creates a new auth method that will be able to authenticate using LDAP.
Name | Type | Description | Notes |
---|---|---|---|
AccessExpires | long | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0] |
AuditLogsClaims | List<string> | Subclaims to include in audit logs, e.g "- -audit-logs-claims email - -audit-logs-claims username" | [optional] |
BoundIps | List<string> | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
DeleteProtection | string | Protection from accidental deletion of this object [true/false] | [optional] |
Description | string | Auth Method description | [optional] |
ForceSubClaims | bool | if true: enforce role-association must include sub claims | [optional] |
GenKey | string | Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided [true/false] | [optional] [default to "true"] |
GwBoundIps | List<string> | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
Json | bool | Set output format to JSON | [optional] [default to false] |
JwtTtl | long | Jwt TTL | [optional] [default to 0] |
Name | string | Auth Method name | |
ProductType | List<string> | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional] |
PublicKeyData | string | A public key generated for LDAP authentication method on Akeyless in base64 or PEM format [RSA2048] | [optional] |
Token | string | Authentication token (see `/auth` and `/configure`) | [optional] |
UidToken | string | The universal identity token, Required only for universal_identity authentication | [optional] |
UniqueIdentifier | string | A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a "sub claim" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization. | [optional] [default to "users"] |