authMethodUpdateGcp is a command that updates a new auth method that will be able to authenticate using GCP IAM Service Account credentials or GCE instance credentials.
Name | Type | Description | Notes |
---|---|---|---|
AccessExpires | long | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0] |
Audience | string | The audience to verify in the JWT received by the client | [default to "akeyless.io"] |
AuditLogsClaims | List<string> | Subclaims to include in audit logs, e.g "- -audit-logs-claims email - -audit-logs-claims username" | [optional] |
BoundIps | List<string> | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
BoundLabels | List<string> | A comma-separated list of GCP labels formatted as "key:value" strings that must be set on authorized GCE instances. TODO: Because GCP labels are not currently ACL'd .... | [optional] |
BoundProjects | List<string> | === Human and Machine authentication section === Array of GCP project IDs. Only entities belonging to any of the provided projects can authenticate. | [optional] |
BoundRegions | List<string> | List of regions that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored. | [optional] |
BoundServiceAccounts | List<string> | List of service accounts the service account must be part of in order to be authenticated. | [optional] |
BoundZones | List<string> | === Machine authentication section === List of zones that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone. | [optional] |
DeleteProtection | string | Protection from accidental deletion of this object [true/false] | [optional] |
Description | string | Auth Method description | [optional] |
ForceSubClaims | bool | if true: enforce role-association must include sub claims | [optional] |
GwBoundIps | List<string> | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
Json | bool | Set output format to JSON | [optional] [default to false] |
JwtTtl | long | Jwt TTL | [optional] [default to 0] |
Name | string | Auth Method name | |
NewName | string | Auth Method new name | [optional] |
ProductType | List<string> | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional] |
ServiceAccountCredsData | string | ServiceAccount credentials data instead of giving a file path, base64 encoded | [optional] |
Token | string | Authentication token (see `/auth` and `/configure`) | [optional] |
Type | string | Type of the GCP Access Rules | |
UidToken | string | The universal identity token, Required only for universal_identity authentication | [optional] |
UniqueIdentifier | string | A unique identifier (ID) value which is a "sub claim" name that contains details uniquely identifying that resource. This "sub claim" is used to distinguish between different identities. | [optional] |