1. Packages
  2. AWS
  3. API Docs
  4. verifiedpermissions
  5. IdentitySource
AWS v6.54.0 published on Friday, Sep 27, 2024 by Pulumi

aws.verifiedpermissions.IdentitySource

Explore with Pulumi AI

aws logo
AWS v6.54.0 published on Friday, Sep 27, 2024 by Pulumi

    Resource for managing an AWS Verified Permissions Identity Source.

    Example Usage

    Cognito User Pool Configuration Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as aws from "@pulumi/aws";
    
    const example = new aws.verifiedpermissions.PolicyStore("example", {validationSettings: {
        mode: "STRICT",
    }});
    const exampleUserPool = new aws.cognito.UserPool("example", {name: "example"});
    const exampleUserPoolClient = new aws.cognito.UserPoolClient("example", {
        name: "example",
        userPoolId: exampleUserPool.id,
        explicitAuthFlows: ["ADMIN_NO_SRP_AUTH"],
    });
    const exampleIdentitySource = new aws.verifiedpermissions.IdentitySource("example", {
        policyStoreId: example.id,
        configuration: {
            cognitoUserPoolConfiguration: {
                userPoolArn: exampleUserPool.arn,
                clientIds: [exampleUserPoolClient.id],
            },
        },
    });
    
    import pulumi
    import pulumi_aws as aws
    
    example = aws.verifiedpermissions.PolicyStore("example", validation_settings={
        "mode": "STRICT",
    })
    example_user_pool = aws.cognito.UserPool("example", name="example")
    example_user_pool_client = aws.cognito.UserPoolClient("example",
        name="example",
        user_pool_id=example_user_pool.id,
        explicit_auth_flows=["ADMIN_NO_SRP_AUTH"])
    example_identity_source = aws.verifiedpermissions.IdentitySource("example",
        policy_store_id=example.id,
        configuration={
            "cognito_user_pool_configuration": {
                "user_pool_arn": example_user_pool.arn,
                "client_ids": [example_user_pool_client.id],
            },
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/cognito"
    	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/verifiedpermissions"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		example, err := verifiedpermissions.NewPolicyStore(ctx, "example", &verifiedpermissions.PolicyStoreArgs{
    			ValidationSettings: &verifiedpermissions.PolicyStoreValidationSettingsArgs{
    				Mode: pulumi.String("STRICT"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		exampleUserPool, err := cognito.NewUserPool(ctx, "example", &cognito.UserPoolArgs{
    			Name: pulumi.String("example"),
    		})
    		if err != nil {
    			return err
    		}
    		exampleUserPoolClient, err := cognito.NewUserPoolClient(ctx, "example", &cognito.UserPoolClientArgs{
    			Name:       pulumi.String("example"),
    			UserPoolId: exampleUserPool.ID(),
    			ExplicitAuthFlows: pulumi.StringArray{
    				pulumi.String("ADMIN_NO_SRP_AUTH"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = verifiedpermissions.NewIdentitySource(ctx, "example", &verifiedpermissions.IdentitySourceArgs{
    			PolicyStoreId: example.ID(),
    			Configuration: &verifiedpermissions.IdentitySourceConfigurationArgs{
    				CognitoUserPoolConfiguration: &verifiedpermissions.IdentitySourceConfigurationCognitoUserPoolConfigurationArgs{
    					UserPoolArn: exampleUserPool.Arn,
    					ClientIds: pulumi.StringArray{
    						exampleUserPoolClient.ID(),
    					},
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Aws = Pulumi.Aws;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Aws.VerifiedPermissions.PolicyStore("example", new()
        {
            ValidationSettings = new Aws.VerifiedPermissions.Inputs.PolicyStoreValidationSettingsArgs
            {
                Mode = "STRICT",
            },
        });
    
        var exampleUserPool = new Aws.Cognito.UserPool("example", new()
        {
            Name = "example",
        });
    
        var exampleUserPoolClient = new Aws.Cognito.UserPoolClient("example", new()
        {
            Name = "example",
            UserPoolId = exampleUserPool.Id,
            ExplicitAuthFlows = new[]
            {
                "ADMIN_NO_SRP_AUTH",
            },
        });
    
        var exampleIdentitySource = new Aws.VerifiedPermissions.IdentitySource("example", new()
        {
            PolicyStoreId = example.Id,
            Configuration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationArgs
            {
                CognitoUserPoolConfiguration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationCognitoUserPoolConfigurationArgs
                {
                    UserPoolArn = exampleUserPool.Arn,
                    ClientIds = new[]
                    {
                        exampleUserPoolClient.Id,
                    },
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.aws.verifiedpermissions.PolicyStore;
    import com.pulumi.aws.verifiedpermissions.PolicyStoreArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.PolicyStoreValidationSettingsArgs;
    import com.pulumi.aws.cognito.UserPool;
    import com.pulumi.aws.cognito.UserPoolArgs;
    import com.pulumi.aws.cognito.UserPoolClient;
    import com.pulumi.aws.cognito.UserPoolClientArgs;
    import com.pulumi.aws.verifiedpermissions.IdentitySource;
    import com.pulumi.aws.verifiedpermissions.IdentitySourceArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.IdentitySourceConfigurationArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.IdentitySourceConfigurationCognitoUserPoolConfigurationArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new PolicyStore("example", PolicyStoreArgs.builder()
                .validationSettings(PolicyStoreValidationSettingsArgs.builder()
                    .mode("STRICT")
                    .build())
                .build());
    
            var exampleUserPool = new UserPool("exampleUserPool", UserPoolArgs.builder()
                .name("example")
                .build());
    
            var exampleUserPoolClient = new UserPoolClient("exampleUserPoolClient", UserPoolClientArgs.builder()
                .name("example")
                .userPoolId(exampleUserPool.id())
                .explicitAuthFlows("ADMIN_NO_SRP_AUTH")
                .build());
    
            var exampleIdentitySource = new IdentitySource("exampleIdentitySource", IdentitySourceArgs.builder()
                .policyStoreId(example.id())
                .configuration(IdentitySourceConfigurationArgs.builder()
                    .cognitoUserPoolConfiguration(IdentitySourceConfigurationCognitoUserPoolConfigurationArgs.builder()
                        .userPoolArn(exampleUserPool.arn())
                        .clientIds(exampleUserPoolClient.id())
                        .build())
                    .build())
                .build());
    
        }
    }
    
    resources:
      example:
        type: aws:verifiedpermissions:PolicyStore
        properties:
          validationSettings:
            mode: STRICT
      exampleUserPool:
        type: aws:cognito:UserPool
        name: example
        properties:
          name: example
      exampleUserPoolClient:
        type: aws:cognito:UserPoolClient
        name: example
        properties:
          name: example
          userPoolId: ${exampleUserPool.id}
          explicitAuthFlows:
            - ADMIN_NO_SRP_AUTH
      exampleIdentitySource:
        type: aws:verifiedpermissions:IdentitySource
        name: example
        properties:
          policyStoreId: ${example.id}
          configuration:
            cognitoUserPoolConfiguration:
              userPoolArn: ${exampleUserPool.arn}
              clientIds:
                - ${exampleUserPoolClient.id}
    

    OpenID Connect Configuration Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as aws from "@pulumi/aws";
    
    const example = new aws.verifiedpermissions.PolicyStore("example", {validationSettings: {
        mode: "STRICT",
    }});
    const exampleIdentitySource = new aws.verifiedpermissions.IdentitySource("example", {
        policyStoreId: example.id,
        configuration: {
            openIdConnectConfiguration: {
                issuer: "https://auth.example.com",
                tokenSelection: {
                    accessTokenOnly: {
                        audiences: ["https://myapp.example.com"],
                        principalIdClaim: "sub",
                    },
                },
                entityIdPrefix: "MyOIDCProvider",
                groupConfiguration: {
                    groupClaim: "groups",
                    groupEntityType: "MyCorp::UserGroup",
                },
            },
        },
        principalEntityType: "MyCorp::User",
    });
    
    import pulumi
    import pulumi_aws as aws
    
    example = aws.verifiedpermissions.PolicyStore("example", validation_settings={
        "mode": "STRICT",
    })
    example_identity_source = aws.verifiedpermissions.IdentitySource("example",
        policy_store_id=example.id,
        configuration={
            "open_id_connect_configuration": {
                "issuer": "https://auth.example.com",
                "token_selection": {
                    "access_token_only": {
                        "audiences": ["https://myapp.example.com"],
                        "principal_id_claim": "sub",
                    },
                },
                "entity_id_prefix": "MyOIDCProvider",
                "group_configuration": {
                    "group_claim": "groups",
                    "group_entity_type": "MyCorp::UserGroup",
                },
            },
        },
        principal_entity_type="MyCorp::User")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/verifiedpermissions"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		example, err := verifiedpermissions.NewPolicyStore(ctx, "example", &verifiedpermissions.PolicyStoreArgs{
    			ValidationSettings: &verifiedpermissions.PolicyStoreValidationSettingsArgs{
    				Mode: pulumi.String("STRICT"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = verifiedpermissions.NewIdentitySource(ctx, "example", &verifiedpermissions.IdentitySourceArgs{
    			PolicyStoreId: example.ID(),
    			Configuration: &verifiedpermissions.IdentitySourceConfigurationArgs{
    				OpenIdConnectConfiguration: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationArgs{
    					Issuer: pulumi.String("https://auth.example.com"),
    					TokenSelection: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs{
    						AccessTokenOnly: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs{
    							Audiences: pulumi.StringArray{
    								pulumi.String("https://myapp.example.com"),
    							},
    							PrincipalIdClaim: pulumi.String("sub"),
    						},
    					},
    					EntityIdPrefix: pulumi.String("MyOIDCProvider"),
    					GroupConfiguration: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs{
    						GroupClaim:      pulumi.String("groups"),
    						GroupEntityType: pulumi.String("MyCorp::UserGroup"),
    					},
    				},
    			},
    			PrincipalEntityType: pulumi.String("MyCorp::User"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Aws = Pulumi.Aws;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Aws.VerifiedPermissions.PolicyStore("example", new()
        {
            ValidationSettings = new Aws.VerifiedPermissions.Inputs.PolicyStoreValidationSettingsArgs
            {
                Mode = "STRICT",
            },
        });
    
        var exampleIdentitySource = new Aws.VerifiedPermissions.IdentitySource("example", new()
        {
            PolicyStoreId = example.Id,
            Configuration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationArgs
            {
                OpenIdConnectConfiguration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationArgs
                {
                    Issuer = "https://auth.example.com",
                    TokenSelection = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs
                    {
                        AccessTokenOnly = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs
                        {
                            Audiences = new[]
                            {
                                "https://myapp.example.com",
                            },
                            PrincipalIdClaim = "sub",
                        },
                    },
                    EntityIdPrefix = "MyOIDCProvider",
                    GroupConfiguration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs
                    {
                        GroupClaim = "groups",
                        GroupEntityType = "MyCorp::UserGroup",
                    },
                },
            },
            PrincipalEntityType = "MyCorp::User",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.aws.verifiedpermissions.PolicyStore;
    import com.pulumi.aws.verifiedpermissions.PolicyStoreArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.PolicyStoreValidationSettingsArgs;
    import com.pulumi.aws.verifiedpermissions.IdentitySource;
    import com.pulumi.aws.verifiedpermissions.IdentitySourceArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.IdentitySourceConfigurationArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.IdentitySourceConfigurationOpenIdConnectConfigurationArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs;
    import com.pulumi.aws.verifiedpermissions.inputs.IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new PolicyStore("example", PolicyStoreArgs.builder()
                .validationSettings(PolicyStoreValidationSettingsArgs.builder()
                    .mode("STRICT")
                    .build())
                .build());
    
            var exampleIdentitySource = new IdentitySource("exampleIdentitySource", IdentitySourceArgs.builder()
                .policyStoreId(example.id())
                .configuration(IdentitySourceConfigurationArgs.builder()
                    .openIdConnectConfiguration(IdentitySourceConfigurationOpenIdConnectConfigurationArgs.builder()
                        .issuer("https://auth.example.com")
                        .tokenSelection(IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs.builder()
                            .accessTokenOnly(IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs.builder()
                                .audiences("https://myapp.example.com")
                                .principalIdClaim("sub")
                                .build())
                            .build())
                        .entityIdPrefix("MyOIDCProvider")
                        .groupConfiguration(IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs.builder()
                            .groupClaim("groups")
                            .groupEntityType("MyCorp::UserGroup")
                            .build())
                        .build())
                    .build())
                .principalEntityType("MyCorp::User")
                .build());
    
        }
    }
    
    resources:
      example:
        type: aws:verifiedpermissions:PolicyStore
        properties:
          validationSettings:
            mode: STRICT
      exampleIdentitySource:
        type: aws:verifiedpermissions:IdentitySource
        name: example
        properties:
          policyStoreId: ${example.id}
          configuration:
            openIdConnectConfiguration:
              issuer: https://auth.example.com
              tokenSelection:
                accessTokenOnly:
                  audiences:
                    - https://myapp.example.com
                  principalIdClaim: sub
              entityIdPrefix: MyOIDCProvider
              groupConfiguration:
                groupClaim: groups
                groupEntityType: MyCorp::UserGroup
          principalEntityType: MyCorp::User
    

    Create IdentitySource Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new IdentitySource(name: string, args: IdentitySourceArgs, opts?: CustomResourceOptions);
    @overload
    def IdentitySource(resource_name: str,
                       args: IdentitySourceArgs,
                       opts: Optional[ResourceOptions] = None)
    
    @overload
    def IdentitySource(resource_name: str,
                       opts: Optional[ResourceOptions] = None,
                       policy_store_id: Optional[str] = None,
                       configuration: Optional[IdentitySourceConfigurationArgs] = None,
                       principal_entity_type: Optional[str] = None)
    func NewIdentitySource(ctx *Context, name string, args IdentitySourceArgs, opts ...ResourceOption) (*IdentitySource, error)
    public IdentitySource(string name, IdentitySourceArgs args, CustomResourceOptions? opts = null)
    public IdentitySource(String name, IdentitySourceArgs args)
    public IdentitySource(String name, IdentitySourceArgs args, CustomResourceOptions options)
    
    type: aws:verifiedpermissions:IdentitySource
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args IdentitySourceArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args IdentitySourceArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args IdentitySourceArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args IdentitySourceArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args IdentitySourceArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var identitySourceResource = new Aws.VerifiedPermissions.IdentitySource("identitySourceResource", new()
    {
        PolicyStoreId = "string",
        Configuration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationArgs
        {
            CognitoUserPoolConfiguration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationCognitoUserPoolConfigurationArgs
            {
                UserPoolArn = "string",
                ClientIds = new[]
                {
                    "string",
                },
                GroupConfiguration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfigurationArgs
                {
                    GroupEntityType = "string",
                },
            },
            OpenIdConnectConfiguration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationArgs
            {
                Issuer = "string",
                EntityIdPrefix = "string",
                GroupConfiguration = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs
                {
                    GroupClaim = "string",
                    GroupEntityType = "string",
                },
                TokenSelection = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs
                {
                    AccessTokenOnly = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs
                    {
                        Audiences = new[]
                        {
                            "string",
                        },
                        PrincipalIdClaim = "string",
                    },
                    IdentityTokenOnly = new Aws.VerifiedPermissions.Inputs.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnlyArgs
                    {
                        ClientIds = new[]
                        {
                            "string",
                        },
                        PrincipalIdClaim = "string",
                    },
                },
            },
        },
        PrincipalEntityType = "string",
    });
    
    example, err := verifiedpermissions.NewIdentitySource(ctx, "identitySourceResource", &verifiedpermissions.IdentitySourceArgs{
    	PolicyStoreId: pulumi.String("string"),
    	Configuration: &verifiedpermissions.IdentitySourceConfigurationArgs{
    		CognitoUserPoolConfiguration: &verifiedpermissions.IdentitySourceConfigurationCognitoUserPoolConfigurationArgs{
    			UserPoolArn: pulumi.String("string"),
    			ClientIds: pulumi.StringArray{
    				pulumi.String("string"),
    			},
    			GroupConfiguration: &verifiedpermissions.IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfigurationArgs{
    				GroupEntityType: pulumi.String("string"),
    			},
    		},
    		OpenIdConnectConfiguration: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationArgs{
    			Issuer:         pulumi.String("string"),
    			EntityIdPrefix: pulumi.String("string"),
    			GroupConfiguration: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs{
    				GroupClaim:      pulumi.String("string"),
    				GroupEntityType: pulumi.String("string"),
    			},
    			TokenSelection: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs{
    				AccessTokenOnly: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs{
    					Audiences: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    					PrincipalIdClaim: pulumi.String("string"),
    				},
    				IdentityTokenOnly: &verifiedpermissions.IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnlyArgs{
    					ClientIds: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    					PrincipalIdClaim: pulumi.String("string"),
    				},
    			},
    		},
    	},
    	PrincipalEntityType: pulumi.String("string"),
    })
    
    var identitySourceResource = new IdentitySource("identitySourceResource", IdentitySourceArgs.builder()
        .policyStoreId("string")
        .configuration(IdentitySourceConfigurationArgs.builder()
            .cognitoUserPoolConfiguration(IdentitySourceConfigurationCognitoUserPoolConfigurationArgs.builder()
                .userPoolArn("string")
                .clientIds("string")
                .groupConfiguration(IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfigurationArgs.builder()
                    .groupEntityType("string")
                    .build())
                .build())
            .openIdConnectConfiguration(IdentitySourceConfigurationOpenIdConnectConfigurationArgs.builder()
                .issuer("string")
                .entityIdPrefix("string")
                .groupConfiguration(IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs.builder()
                    .groupClaim("string")
                    .groupEntityType("string")
                    .build())
                .tokenSelection(IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs.builder()
                    .accessTokenOnly(IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs.builder()
                        .audiences("string")
                        .principalIdClaim("string")
                        .build())
                    .identityTokenOnly(IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnlyArgs.builder()
                        .clientIds("string")
                        .principalIdClaim("string")
                        .build())
                    .build())
                .build())
            .build())
        .principalEntityType("string")
        .build());
    
    identity_source_resource = aws.verifiedpermissions.IdentitySource("identitySourceResource",
        policy_store_id="string",
        configuration={
            "cognitoUserPoolConfiguration": {
                "userPoolArn": "string",
                "clientIds": ["string"],
                "groupConfiguration": {
                    "groupEntityType": "string",
                },
            },
            "openIdConnectConfiguration": {
                "issuer": "string",
                "entityIdPrefix": "string",
                "groupConfiguration": {
                    "groupClaim": "string",
                    "groupEntityType": "string",
                },
                "tokenSelection": {
                    "accessTokenOnly": {
                        "audiences": ["string"],
                        "principalIdClaim": "string",
                    },
                    "identityTokenOnly": {
                        "clientIds": ["string"],
                        "principalIdClaim": "string",
                    },
                },
            },
        },
        principal_entity_type="string")
    
    const identitySourceResource = new aws.verifiedpermissions.IdentitySource("identitySourceResource", {
        policyStoreId: "string",
        configuration: {
            cognitoUserPoolConfiguration: {
                userPoolArn: "string",
                clientIds: ["string"],
                groupConfiguration: {
                    groupEntityType: "string",
                },
            },
            openIdConnectConfiguration: {
                issuer: "string",
                entityIdPrefix: "string",
                groupConfiguration: {
                    groupClaim: "string",
                    groupEntityType: "string",
                },
                tokenSelection: {
                    accessTokenOnly: {
                        audiences: ["string"],
                        principalIdClaim: "string",
                    },
                    identityTokenOnly: {
                        clientIds: ["string"],
                        principalIdClaim: "string",
                    },
                },
            },
        },
        principalEntityType: "string",
    });
    
    type: aws:verifiedpermissions:IdentitySource
    properties:
        configuration:
            cognitoUserPoolConfiguration:
                clientIds:
                    - string
                groupConfiguration:
                    groupEntityType: string
                userPoolArn: string
            openIdConnectConfiguration:
                entityIdPrefix: string
                groupConfiguration:
                    groupClaim: string
                    groupEntityType: string
                issuer: string
                tokenSelection:
                    accessTokenOnly:
                        audiences:
                            - string
                        principalIdClaim: string
                    identityTokenOnly:
                        clientIds:
                            - string
                        principalIdClaim: string
        policyStoreId: string
        principalEntityType: string
    

    IdentitySource Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The IdentitySource resource accepts the following input properties:

    PolicyStoreId string
    Specifies the ID of the policy store in which you want to store this identity source.
    Configuration IdentitySourceConfiguration
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    PrincipalEntityType string
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    PolicyStoreId string
    Specifies the ID of the policy store in which you want to store this identity source.
    Configuration IdentitySourceConfigurationArgs
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    PrincipalEntityType string
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    policyStoreId String
    Specifies the ID of the policy store in which you want to store this identity source.
    configuration IdentitySourceConfiguration
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    principalEntityType String
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    policyStoreId string
    Specifies the ID of the policy store in which you want to store this identity source.
    configuration IdentitySourceConfiguration
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    principalEntityType string
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    policy_store_id str
    Specifies the ID of the policy store in which you want to store this identity source.
    configuration IdentitySourceConfigurationArgs
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    principal_entity_type str
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    policyStoreId String
    Specifies the ID of the policy store in which you want to store this identity source.
    configuration Property Map
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    principalEntityType String
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the IdentitySource resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing IdentitySource Resource

    Get an existing IdentitySource resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: IdentitySourceState, opts?: CustomResourceOptions): IdentitySource
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            configuration: Optional[IdentitySourceConfigurationArgs] = None,
            policy_store_id: Optional[str] = None,
            principal_entity_type: Optional[str] = None) -> IdentitySource
    func GetIdentitySource(ctx *Context, name string, id IDInput, state *IdentitySourceState, opts ...ResourceOption) (*IdentitySource, error)
    public static IdentitySource Get(string name, Input<string> id, IdentitySourceState? state, CustomResourceOptions? opts = null)
    public static IdentitySource get(String name, Output<String> id, IdentitySourceState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Configuration IdentitySourceConfiguration
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    PolicyStoreId string
    Specifies the ID of the policy store in which you want to store this identity source.
    PrincipalEntityType string
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    Configuration IdentitySourceConfigurationArgs
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    PolicyStoreId string
    Specifies the ID of the policy store in which you want to store this identity source.
    PrincipalEntityType string
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    configuration IdentitySourceConfiguration
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    policyStoreId String
    Specifies the ID of the policy store in which you want to store this identity source.
    principalEntityType String
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    configuration IdentitySourceConfiguration
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    policyStoreId string
    Specifies the ID of the policy store in which you want to store this identity source.
    principalEntityType string
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    configuration IdentitySourceConfigurationArgs
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    policy_store_id str
    Specifies the ID of the policy store in which you want to store this identity source.
    principal_entity_type str
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.
    configuration Property Map
    Specifies the details required to communicate with the identity provider (IdP) associated with this identity source. See Configuration below.
    policyStoreId String
    Specifies the ID of the policy store in which you want to store this identity source.
    principalEntityType String
    Specifies the namespace and data type of the principals generated for identities authenticated by the new identity source.

    Supporting Types

    IdentitySourceConfiguration, IdentitySourceConfigurationArgs

    CognitoUserPoolConfiguration IdentitySourceConfigurationCognitoUserPoolConfiguration
    Specifies the configuration details of an Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. See Cognito User Pool Configuration below.
    OpenIdConnectConfiguration IdentitySourceConfigurationOpenIdConnectConfiguration
    Specifies the configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. See Open ID Connect Configuration below.
    CognitoUserPoolConfiguration IdentitySourceConfigurationCognitoUserPoolConfiguration
    Specifies the configuration details of an Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. See Cognito User Pool Configuration below.
    OpenIdConnectConfiguration IdentitySourceConfigurationOpenIdConnectConfiguration
    Specifies the configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. See Open ID Connect Configuration below.
    cognitoUserPoolConfiguration IdentitySourceConfigurationCognitoUserPoolConfiguration
    Specifies the configuration details of an Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. See Cognito User Pool Configuration below.
    openIdConnectConfiguration IdentitySourceConfigurationOpenIdConnectConfiguration
    Specifies the configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. See Open ID Connect Configuration below.
    cognitoUserPoolConfiguration IdentitySourceConfigurationCognitoUserPoolConfiguration
    Specifies the configuration details of an Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. See Cognito User Pool Configuration below.
    openIdConnectConfiguration IdentitySourceConfigurationOpenIdConnectConfiguration
    Specifies the configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. See Open ID Connect Configuration below.
    cognito_user_pool_configuration IdentitySourceConfigurationCognitoUserPoolConfiguration
    Specifies the configuration details of an Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. See Cognito User Pool Configuration below.
    open_id_connect_configuration IdentitySourceConfigurationOpenIdConnectConfiguration
    Specifies the configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. See Open ID Connect Configuration below.
    cognitoUserPoolConfiguration Property Map
    Specifies the configuration details of an Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. See Cognito User Pool Configuration below.
    openIdConnectConfiguration Property Map
    Specifies the configuration details of an OpenID Connect (OIDC) identity provider, or identity source, that Verified Permissions can use to generate entities from authenticated identities. See Open ID Connect Configuration below.

    IdentitySourceConfigurationCognitoUserPoolConfiguration, IdentitySourceConfigurationCognitoUserPoolConfigurationArgs

    UserPoolArn string
    The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
    ClientIds List<string>
    The unique application client IDs that are associated with the specified Amazon Cognito user pool.
    GroupConfiguration IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    UserPoolArn string
    The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
    ClientIds []string
    The unique application client IDs that are associated with the specified Amazon Cognito user pool.
    GroupConfiguration IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    userPoolArn String
    The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
    clientIds List<String>
    The unique application client IDs that are associated with the specified Amazon Cognito user pool.
    groupConfiguration IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    userPoolArn string
    The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
    clientIds string[]
    The unique application client IDs that are associated with the specified Amazon Cognito user pool.
    groupConfiguration IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    user_pool_arn str
    The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
    client_ids Sequence[str]
    The unique application client IDs that are associated with the specified Amazon Cognito user pool.
    group_configuration IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    userPoolArn String
    The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized.
    clientIds List<String>
    The unique application client IDs that are associated with the specified Amazon Cognito user pool.
    groupConfiguration Property Map
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.

    IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfiguration, IdentitySourceConfigurationCognitoUserPoolConfigurationGroupConfigurationArgs

    GroupEntityType string
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    GroupEntityType string
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    groupEntityType String
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    groupEntityType string
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    group_entity_type str
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    groupEntityType String
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.

    IdentitySourceConfigurationOpenIdConnectConfiguration, IdentitySourceConfigurationOpenIdConnectConfigurationArgs

    Issuer string
    The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
    EntityIdPrefix string
    A descriptive string that you want to prefix to user entities from your OIDC identity provider.
    GroupConfiguration IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    TokenSelection IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelection
    The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source. See Token Selection below.
    Issuer string
    The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
    EntityIdPrefix string
    A descriptive string that you want to prefix to user entities from your OIDC identity provider.
    GroupConfiguration IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    TokenSelection IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelection
    The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source. See Token Selection below.
    issuer String
    The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
    entityIdPrefix String
    A descriptive string that you want to prefix to user entities from your OIDC identity provider.
    groupConfiguration IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    tokenSelection IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelection
    The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source. See Token Selection below.
    issuer string
    The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
    entityIdPrefix string
    A descriptive string that you want to prefix to user entities from your OIDC identity provider.
    groupConfiguration IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    tokenSelection IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelection
    The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source. See Token Selection below.
    issuer str
    The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
    entity_id_prefix str
    A descriptive string that you want to prefix to user entities from your OIDC identity provider.
    group_configuration IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfiguration
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    token_selection IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelection
    The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source. See Token Selection below.
    issuer String
    The issuer URL of an OIDC identity provider. This URL must have an OIDC discovery endpoint at the path .well-known/openid-configuration.
    entityIdPrefix String
    A descriptive string that you want to prefix to user entities from your OIDC identity provider.
    groupConfiguration Property Map
    The type of entity that a policy store maps to groups from an Amazon Cognito user pool identity source. See Group Configuration below.
    tokenSelection Property Map
    The token type that you want to process from your OIDC identity provider. Your policy store can process either identity (ID) or access tokens from a given OIDC identity source. See Token Selection below.

    IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfiguration, IdentitySourceConfigurationOpenIdConnectConfigurationGroupConfigurationArgs

    GroupClaim string
    The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
    GroupEntityType string
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    GroupClaim string
    The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
    GroupEntityType string
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    groupClaim String
    The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
    groupEntityType String
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    groupClaim string
    The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
    groupEntityType string
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    group_claim str
    The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
    group_entity_type str
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
    groupClaim String
    The token claim that you want Verified Permissions to interpret as group membership. For example, groups.
    groupEntityType String
    The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.

    IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelection, IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionArgs

    AccessTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnly
    The OIDC configuration for processing access tokens. See Access Token Only below.
    IdentityTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnly
    The OIDC configuration for processing identity (ID) tokens. See Identity Token Only below.
    AccessTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnly
    The OIDC configuration for processing access tokens. See Access Token Only below.
    IdentityTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnly
    The OIDC configuration for processing identity (ID) tokens. See Identity Token Only below.
    accessTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnly
    The OIDC configuration for processing access tokens. See Access Token Only below.
    identityTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnly
    The OIDC configuration for processing identity (ID) tokens. See Identity Token Only below.
    accessTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnly
    The OIDC configuration for processing access tokens. See Access Token Only below.
    identityTokenOnly IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnly
    The OIDC configuration for processing identity (ID) tokens. See Identity Token Only below.
    access_token_only IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnly
    The OIDC configuration for processing access tokens. See Access Token Only below.
    identity_token_only IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnly
    The OIDC configuration for processing identity (ID) tokens. See Identity Token Only below.
    accessTokenOnly Property Map
    The OIDC configuration for processing access tokens. See Access Token Only below.
    identityTokenOnly Property Map
    The OIDC configuration for processing identity (ID) tokens. See Identity Token Only below.

    IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnly, IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionAccessTokenOnlyArgs

    Audiences List<string>
    The access token aud claim values that you want to accept in your policy store.
    PrincipalIdClaim string
    The claim that determines the principal in OIDC access tokens.
    Audiences []string
    The access token aud claim values that you want to accept in your policy store.
    PrincipalIdClaim string
    The claim that determines the principal in OIDC access tokens.
    audiences List<String>
    The access token aud claim values that you want to accept in your policy store.
    principalIdClaim String
    The claim that determines the principal in OIDC access tokens.
    audiences string[]
    The access token aud claim values that you want to accept in your policy store.
    principalIdClaim string
    The claim that determines the principal in OIDC access tokens.
    audiences Sequence[str]
    The access token aud claim values that you want to accept in your policy store.
    principal_id_claim str
    The claim that determines the principal in OIDC access tokens.
    audiences List<String>
    The access token aud claim values that you want to accept in your policy store.
    principalIdClaim String
    The claim that determines the principal in OIDC access tokens.

    IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnly, IdentitySourceConfigurationOpenIdConnectConfigurationTokenSelectionIdentityTokenOnlyArgs

    ClientIds List<string>
    The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider.
    PrincipalIdClaim string
    The claim that determines the principal in OIDC access tokens.
    ClientIds []string
    The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider.
    PrincipalIdClaim string
    The claim that determines the principal in OIDC access tokens.
    clientIds List<String>
    The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider.
    principalIdClaim String
    The claim that determines the principal in OIDC access tokens.
    clientIds string[]
    The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider.
    principalIdClaim string
    The claim that determines the principal in OIDC access tokens.
    client_ids Sequence[str]
    The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider.
    principal_id_claim str
    The claim that determines the principal in OIDC access tokens.
    clientIds List<String>
    The ID token audience, or client ID, claim values that you want to accept in your policy store from an OIDC identity provider.
    principalIdClaim String
    The claim that determines the principal in OIDC access tokens.

    Import

    Using pulumi import, import Verified Permissions Identity Source using the policy_store_id:identity_source_id. For example:

    $ pulumi import aws:verifiedpermissions/identitySource:IdentitySource example policy-store-id-12345678:identity-source-id-12345678
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    AWS Classic pulumi/pulumi-aws
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the aws Terraform Provider.
    aws logo
    AWS v6.54.0 published on Friday, Sep 27, 2024 by Pulumi