fortios.system.Accprofile
Explore with Pulumi AI
Configure access profiles for system administrators.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as fortios from "@pulumiverse/fortios";
const test12 = new fortios.system.Accprofile("test12", {
admintimeout: 10,
admintimeoutOverride: "disable",
authgrp: "read-write",
ftviewgrp: "read-write",
fwgrp: "custom",
fwgrpPermission: {
address: "read-write",
policy: "read-write",
schedule: "none",
service: "none",
},
loggrp: "read-write",
loggrpPermission: {
config: "none",
dataAccess: "none",
reportAccess: "none",
threatWeight: "none",
},
netgrp: "read-write",
netgrpPermission: {
cfg: "none",
packetCapture: "none",
routeCfg: "none",
},
scope: "vdom",
secfabgrp: "read-write",
sysgrp: "read-write",
sysgrpPermission: {
admin: "none",
cfg: "none",
mnt: "none",
upd: "none",
},
utmgrp: "custom",
utmgrpPermission: {
antivirus: "read-write",
applicationControl: "none",
dataLossPrevention: "none",
dnsfilter: "none",
endpointControl: "none",
icap: "none",
ips: "read-write",
voip: "none",
waf: "none",
webfilter: "none",
},
vpngrp: "read-write",
wanoptgrp: "read-write",
wifi: "read-write",
});
import pulumi
import pulumiverse_fortios as fortios
test12 = fortios.system.Accprofile("test12",
admintimeout=10,
admintimeout_override="disable",
authgrp="read-write",
ftviewgrp="read-write",
fwgrp="custom",
fwgrp_permission=fortios.system.AccprofileFwgrpPermissionArgs(
address="read-write",
policy="read-write",
schedule="none",
service="none",
),
loggrp="read-write",
loggrp_permission=fortios.system.AccprofileLoggrpPermissionArgs(
config="none",
data_access="none",
report_access="none",
threat_weight="none",
),
netgrp="read-write",
netgrp_permission=fortios.system.AccprofileNetgrpPermissionArgs(
cfg="none",
packet_capture="none",
route_cfg="none",
),
scope="vdom",
secfabgrp="read-write",
sysgrp="read-write",
sysgrp_permission=fortios.system.AccprofileSysgrpPermissionArgs(
admin="none",
cfg="none",
mnt="none",
upd="none",
),
utmgrp="custom",
utmgrp_permission=fortios.system.AccprofileUtmgrpPermissionArgs(
antivirus="read-write",
application_control="none",
data_loss_prevention="none",
dnsfilter="none",
endpoint_control="none",
icap="none",
ips="read-write",
voip="none",
waf="none",
webfilter="none",
),
vpngrp="read-write",
wanoptgrp="read-write",
wifi="read-write")
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/system"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := system.NewAccprofile(ctx, "test12", &system.AccprofileArgs{
Admintimeout: pulumi.Int(10),
AdmintimeoutOverride: pulumi.String("disable"),
Authgrp: pulumi.String("read-write"),
Ftviewgrp: pulumi.String("read-write"),
Fwgrp: pulumi.String("custom"),
FwgrpPermission: &system.AccprofileFwgrpPermissionArgs{
Address: pulumi.String("read-write"),
Policy: pulumi.String("read-write"),
Schedule: pulumi.String("none"),
Service: pulumi.String("none"),
},
Loggrp: pulumi.String("read-write"),
LoggrpPermission: &system.AccprofileLoggrpPermissionArgs{
Config: pulumi.String("none"),
DataAccess: pulumi.String("none"),
ReportAccess: pulumi.String("none"),
ThreatWeight: pulumi.String("none"),
},
Netgrp: pulumi.String("read-write"),
NetgrpPermission: &system.AccprofileNetgrpPermissionArgs{
Cfg: pulumi.String("none"),
PacketCapture: pulumi.String("none"),
RouteCfg: pulumi.String("none"),
},
Scope: pulumi.String("vdom"),
Secfabgrp: pulumi.String("read-write"),
Sysgrp: pulumi.String("read-write"),
SysgrpPermission: &system.AccprofileSysgrpPermissionArgs{
Admin: pulumi.String("none"),
Cfg: pulumi.String("none"),
Mnt: pulumi.String("none"),
Upd: pulumi.String("none"),
},
Utmgrp: pulumi.String("custom"),
UtmgrpPermission: &system.AccprofileUtmgrpPermissionArgs{
Antivirus: pulumi.String("read-write"),
ApplicationControl: pulumi.String("none"),
DataLossPrevention: pulumi.String("none"),
Dnsfilter: pulumi.String("none"),
EndpointControl: pulumi.String("none"),
Icap: pulumi.String("none"),
Ips: pulumi.String("read-write"),
Voip: pulumi.String("none"),
Waf: pulumi.String("none"),
Webfilter: pulumi.String("none"),
},
Vpngrp: pulumi.String("read-write"),
Wanoptgrp: pulumi.String("read-write"),
Wifi: pulumi.String("read-write"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortios = Pulumiverse.Fortios;
return await Deployment.RunAsync(() =>
{
var test12 = new Fortios.System.Accprofile("test12", new()
{
Admintimeout = 10,
AdmintimeoutOverride = "disable",
Authgrp = "read-write",
Ftviewgrp = "read-write",
Fwgrp = "custom",
FwgrpPermission = new Fortios.System.Inputs.AccprofileFwgrpPermissionArgs
{
Address = "read-write",
Policy = "read-write",
Schedule = "none",
Service = "none",
},
Loggrp = "read-write",
LoggrpPermission = new Fortios.System.Inputs.AccprofileLoggrpPermissionArgs
{
Config = "none",
DataAccess = "none",
ReportAccess = "none",
ThreatWeight = "none",
},
Netgrp = "read-write",
NetgrpPermission = new Fortios.System.Inputs.AccprofileNetgrpPermissionArgs
{
Cfg = "none",
PacketCapture = "none",
RouteCfg = "none",
},
Scope = "vdom",
Secfabgrp = "read-write",
Sysgrp = "read-write",
SysgrpPermission = new Fortios.System.Inputs.AccprofileSysgrpPermissionArgs
{
Admin = "none",
Cfg = "none",
Mnt = "none",
Upd = "none",
},
Utmgrp = "custom",
UtmgrpPermission = new Fortios.System.Inputs.AccprofileUtmgrpPermissionArgs
{
Antivirus = "read-write",
ApplicationControl = "none",
DataLossPrevention = "none",
Dnsfilter = "none",
EndpointControl = "none",
Icap = "none",
Ips = "read-write",
Voip = "none",
Waf = "none",
Webfilter = "none",
},
Vpngrp = "read-write",
Wanoptgrp = "read-write",
Wifi = "read-write",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortios.system.Accprofile;
import com.pulumi.fortios.system.AccprofileArgs;
import com.pulumi.fortios.system.inputs.AccprofileFwgrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileLoggrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileNetgrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileSysgrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileUtmgrpPermissionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var test12 = new Accprofile("test12", AccprofileArgs.builder()
.admintimeout(10)
.admintimeoutOverride("disable")
.authgrp("read-write")
.ftviewgrp("read-write")
.fwgrp("custom")
.fwgrpPermission(AccprofileFwgrpPermissionArgs.builder()
.address("read-write")
.policy("read-write")
.schedule("none")
.service("none")
.build())
.loggrp("read-write")
.loggrpPermission(AccprofileLoggrpPermissionArgs.builder()
.config("none")
.dataAccess("none")
.reportAccess("none")
.threatWeight("none")
.build())
.netgrp("read-write")
.netgrpPermission(AccprofileNetgrpPermissionArgs.builder()
.cfg("none")
.packetCapture("none")
.routeCfg("none")
.build())
.scope("vdom")
.secfabgrp("read-write")
.sysgrp("read-write")
.sysgrpPermission(AccprofileSysgrpPermissionArgs.builder()
.admin("none")
.cfg("none")
.mnt("none")
.upd("none")
.build())
.utmgrp("custom")
.utmgrpPermission(AccprofileUtmgrpPermissionArgs.builder()
.antivirus("read-write")
.applicationControl("none")
.dataLossPrevention("none")
.dnsfilter("none")
.endpointControl("none")
.icap("none")
.ips("read-write")
.voip("none")
.waf("none")
.webfilter("none")
.build())
.vpngrp("read-write")
.wanoptgrp("read-write")
.wifi("read-write")
.build());
}
}
resources:
test12:
type: fortios:system:Accprofile
properties:
admintimeout: 10
admintimeoutOverride: disable
authgrp: read-write
ftviewgrp: read-write
fwgrp: custom
fwgrpPermission:
address: read-write
policy: read-write
schedule: none
service: none
loggrp: read-write
loggrpPermission:
config: none
dataAccess: none
reportAccess: none
threatWeight: none
netgrp: read-write
netgrpPermission:
cfg: none
packetCapture: none
routeCfg: none
scope: vdom
secfabgrp: read-write
sysgrp: read-write
sysgrpPermission:
admin: none
cfg: none
mnt: none
upd: none
utmgrp: custom
utmgrpPermission:
antivirus: read-write
applicationControl: none
dataLossPrevention: none
dnsfilter: none
endpointControl: none
icap: none
ips: read-write
voip: none
waf: none
webfilter: none
vpngrp: read-write
wanoptgrp: read-write
wifi: read-write
Create Accprofile Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Accprofile(name: string, args?: AccprofileArgs, opts?: CustomResourceOptions);
@overload
def Accprofile(resource_name: str,
args: Optional[AccprofileArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def Accprofile(resource_name: str,
opts: Optional[ResourceOptions] = None,
admintimeout: Optional[int] = None,
admintimeout_override: Optional[str] = None,
authgrp: Optional[str] = None,
cli_config: Optional[str] = None,
cli_diagnose: Optional[str] = None,
cli_exec: Optional[str] = None,
cli_get: Optional[str] = None,
cli_show: Optional[str] = None,
comments: Optional[str] = None,
ftviewgrp: Optional[str] = None,
fwgrp: Optional[str] = None,
fwgrp_permission: Optional[AccprofileFwgrpPermissionArgs] = None,
get_all_tables: Optional[str] = None,
loggrp: Optional[str] = None,
loggrp_permission: Optional[AccprofileLoggrpPermissionArgs] = None,
name: Optional[str] = None,
netgrp: Optional[str] = None,
netgrp_permission: Optional[AccprofileNetgrpPermissionArgs] = None,
scope: Optional[str] = None,
secfabgrp: Optional[str] = None,
sysgrp: Optional[str] = None,
sysgrp_permission: Optional[AccprofileSysgrpPermissionArgs] = None,
system_diagnostics: Optional[str] = None,
system_execute_ssh: Optional[str] = None,
system_execute_telnet: Optional[str] = None,
utmgrp: Optional[str] = None,
utmgrp_permission: Optional[AccprofileUtmgrpPermissionArgs] = None,
vdomparam: Optional[str] = None,
vpngrp: Optional[str] = None,
wanoptgrp: Optional[str] = None,
wifi: Optional[str] = None)
func NewAccprofile(ctx *Context, name string, args *AccprofileArgs, opts ...ResourceOption) (*Accprofile, error)
public Accprofile(string name, AccprofileArgs? args = null, CustomResourceOptions? opts = null)
public Accprofile(String name, AccprofileArgs args)
public Accprofile(String name, AccprofileArgs args, CustomResourceOptions options)
type: fortios:system:Accprofile
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AccprofileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AccprofileArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AccprofileArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AccprofileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AccprofileArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var accprofileResource = new Fortios.System.Accprofile("accprofileResource", new()
{
Admintimeout = 0,
AdmintimeoutOverride = "string",
Authgrp = "string",
CliConfig = "string",
CliDiagnose = "string",
CliExec = "string",
CliGet = "string",
CliShow = "string",
Comments = "string",
Ftviewgrp = "string",
Fwgrp = "string",
FwgrpPermission = new Fortios.System.Inputs.AccprofileFwgrpPermissionArgs
{
Address = "string",
Others = "string",
Policy = "string",
Schedule = "string",
Service = "string",
},
GetAllTables = "string",
Loggrp = "string",
LoggrpPermission = new Fortios.System.Inputs.AccprofileLoggrpPermissionArgs
{
Config = "string",
DataAccess = "string",
ReportAccess = "string",
ThreatWeight = "string",
},
Name = "string",
Netgrp = "string",
NetgrpPermission = new Fortios.System.Inputs.AccprofileNetgrpPermissionArgs
{
Cfg = "string",
PacketCapture = "string",
RouteCfg = "string",
},
Scope = "string",
Secfabgrp = "string",
Sysgrp = "string",
SysgrpPermission = new Fortios.System.Inputs.AccprofileSysgrpPermissionArgs
{
Admin = "string",
Cfg = "string",
Mnt = "string",
Upd = "string",
},
SystemDiagnostics = "string",
SystemExecuteSsh = "string",
SystemExecuteTelnet = "string",
Utmgrp = "string",
UtmgrpPermission = new Fortios.System.Inputs.AccprofileUtmgrpPermissionArgs
{
Antivirus = "string",
ApplicationControl = "string",
Casb = "string",
DataLeakPrevention = "string",
DataLossPrevention = "string",
Dlp = "string",
Dnsfilter = "string",
Emailfilter = "string",
EndpointControl = "string",
FileFilter = "string",
Icap = "string",
Ips = "string",
Spamfilter = "string",
Videofilter = "string",
VirtualPatch = "string",
Voip = "string",
Waf = "string",
Webfilter = "string",
},
Vdomparam = "string",
Vpngrp = "string",
Wanoptgrp = "string",
Wifi = "string",
});
example, err := system.NewAccprofile(ctx, "accprofileResource", &system.AccprofileArgs{
Admintimeout: pulumi.Int(0),
AdmintimeoutOverride: pulumi.String("string"),
Authgrp: pulumi.String("string"),
CliConfig: pulumi.String("string"),
CliDiagnose: pulumi.String("string"),
CliExec: pulumi.String("string"),
CliGet: pulumi.String("string"),
CliShow: pulumi.String("string"),
Comments: pulumi.String("string"),
Ftviewgrp: pulumi.String("string"),
Fwgrp: pulumi.String("string"),
FwgrpPermission: &system.AccprofileFwgrpPermissionArgs{
Address: pulumi.String("string"),
Others: pulumi.String("string"),
Policy: pulumi.String("string"),
Schedule: pulumi.String("string"),
Service: pulumi.String("string"),
},
GetAllTables: pulumi.String("string"),
Loggrp: pulumi.String("string"),
LoggrpPermission: &system.AccprofileLoggrpPermissionArgs{
Config: pulumi.String("string"),
DataAccess: pulumi.String("string"),
ReportAccess: pulumi.String("string"),
ThreatWeight: pulumi.String("string"),
},
Name: pulumi.String("string"),
Netgrp: pulumi.String("string"),
NetgrpPermission: &system.AccprofileNetgrpPermissionArgs{
Cfg: pulumi.String("string"),
PacketCapture: pulumi.String("string"),
RouteCfg: pulumi.String("string"),
},
Scope: pulumi.String("string"),
Secfabgrp: pulumi.String("string"),
Sysgrp: pulumi.String("string"),
SysgrpPermission: &system.AccprofileSysgrpPermissionArgs{
Admin: pulumi.String("string"),
Cfg: pulumi.String("string"),
Mnt: pulumi.String("string"),
Upd: pulumi.String("string"),
},
SystemDiagnostics: pulumi.String("string"),
SystemExecuteSsh: pulumi.String("string"),
SystemExecuteTelnet: pulumi.String("string"),
Utmgrp: pulumi.String("string"),
UtmgrpPermission: &system.AccprofileUtmgrpPermissionArgs{
Antivirus: pulumi.String("string"),
ApplicationControl: pulumi.String("string"),
Casb: pulumi.String("string"),
DataLeakPrevention: pulumi.String("string"),
DataLossPrevention: pulumi.String("string"),
Dlp: pulumi.String("string"),
Dnsfilter: pulumi.String("string"),
Emailfilter: pulumi.String("string"),
EndpointControl: pulumi.String("string"),
FileFilter: pulumi.String("string"),
Icap: pulumi.String("string"),
Ips: pulumi.String("string"),
Spamfilter: pulumi.String("string"),
Videofilter: pulumi.String("string"),
VirtualPatch: pulumi.String("string"),
Voip: pulumi.String("string"),
Waf: pulumi.String("string"),
Webfilter: pulumi.String("string"),
},
Vdomparam: pulumi.String("string"),
Vpngrp: pulumi.String("string"),
Wanoptgrp: pulumi.String("string"),
Wifi: pulumi.String("string"),
})
var accprofileResource = new Accprofile("accprofileResource", AccprofileArgs.builder()
.admintimeout(0)
.admintimeoutOverride("string")
.authgrp("string")
.cliConfig("string")
.cliDiagnose("string")
.cliExec("string")
.cliGet("string")
.cliShow("string")
.comments("string")
.ftviewgrp("string")
.fwgrp("string")
.fwgrpPermission(AccprofileFwgrpPermissionArgs.builder()
.address("string")
.others("string")
.policy("string")
.schedule("string")
.service("string")
.build())
.getAllTables("string")
.loggrp("string")
.loggrpPermission(AccprofileLoggrpPermissionArgs.builder()
.config("string")
.dataAccess("string")
.reportAccess("string")
.threatWeight("string")
.build())
.name("string")
.netgrp("string")
.netgrpPermission(AccprofileNetgrpPermissionArgs.builder()
.cfg("string")
.packetCapture("string")
.routeCfg("string")
.build())
.scope("string")
.secfabgrp("string")
.sysgrp("string")
.sysgrpPermission(AccprofileSysgrpPermissionArgs.builder()
.admin("string")
.cfg("string")
.mnt("string")
.upd("string")
.build())
.systemDiagnostics("string")
.systemExecuteSsh("string")
.systemExecuteTelnet("string")
.utmgrp("string")
.utmgrpPermission(AccprofileUtmgrpPermissionArgs.builder()
.antivirus("string")
.applicationControl("string")
.casb("string")
.dataLeakPrevention("string")
.dataLossPrevention("string")
.dlp("string")
.dnsfilter("string")
.emailfilter("string")
.endpointControl("string")
.fileFilter("string")
.icap("string")
.ips("string")
.spamfilter("string")
.videofilter("string")
.virtualPatch("string")
.voip("string")
.waf("string")
.webfilter("string")
.build())
.vdomparam("string")
.vpngrp("string")
.wanoptgrp("string")
.wifi("string")
.build());
accprofile_resource = fortios.system.Accprofile("accprofileResource",
admintimeout=0,
admintimeout_override="string",
authgrp="string",
cli_config="string",
cli_diagnose="string",
cli_exec="string",
cli_get="string",
cli_show="string",
comments="string",
ftviewgrp="string",
fwgrp="string",
fwgrp_permission=fortios.system.AccprofileFwgrpPermissionArgs(
address="string",
others="string",
policy="string",
schedule="string",
service="string",
),
get_all_tables="string",
loggrp="string",
loggrp_permission=fortios.system.AccprofileLoggrpPermissionArgs(
config="string",
data_access="string",
report_access="string",
threat_weight="string",
),
name="string",
netgrp="string",
netgrp_permission=fortios.system.AccprofileNetgrpPermissionArgs(
cfg="string",
packet_capture="string",
route_cfg="string",
),
scope="string",
secfabgrp="string",
sysgrp="string",
sysgrp_permission=fortios.system.AccprofileSysgrpPermissionArgs(
admin="string",
cfg="string",
mnt="string",
upd="string",
),
system_diagnostics="string",
system_execute_ssh="string",
system_execute_telnet="string",
utmgrp="string",
utmgrp_permission=fortios.system.AccprofileUtmgrpPermissionArgs(
antivirus="string",
application_control="string",
casb="string",
data_leak_prevention="string",
data_loss_prevention="string",
dlp="string",
dnsfilter="string",
emailfilter="string",
endpoint_control="string",
file_filter="string",
icap="string",
ips="string",
spamfilter="string",
videofilter="string",
virtual_patch="string",
voip="string",
waf="string",
webfilter="string",
),
vdomparam="string",
vpngrp="string",
wanoptgrp="string",
wifi="string")
const accprofileResource = new fortios.system.Accprofile("accprofileResource", {
admintimeout: 0,
admintimeoutOverride: "string",
authgrp: "string",
cliConfig: "string",
cliDiagnose: "string",
cliExec: "string",
cliGet: "string",
cliShow: "string",
comments: "string",
ftviewgrp: "string",
fwgrp: "string",
fwgrpPermission: {
address: "string",
others: "string",
policy: "string",
schedule: "string",
service: "string",
},
getAllTables: "string",
loggrp: "string",
loggrpPermission: {
config: "string",
dataAccess: "string",
reportAccess: "string",
threatWeight: "string",
},
name: "string",
netgrp: "string",
netgrpPermission: {
cfg: "string",
packetCapture: "string",
routeCfg: "string",
},
scope: "string",
secfabgrp: "string",
sysgrp: "string",
sysgrpPermission: {
admin: "string",
cfg: "string",
mnt: "string",
upd: "string",
},
systemDiagnostics: "string",
systemExecuteSsh: "string",
systemExecuteTelnet: "string",
utmgrp: "string",
utmgrpPermission: {
antivirus: "string",
applicationControl: "string",
casb: "string",
dataLeakPrevention: "string",
dataLossPrevention: "string",
dlp: "string",
dnsfilter: "string",
emailfilter: "string",
endpointControl: "string",
fileFilter: "string",
icap: "string",
ips: "string",
spamfilter: "string",
videofilter: "string",
virtualPatch: "string",
voip: "string",
waf: "string",
webfilter: "string",
},
vdomparam: "string",
vpngrp: "string",
wanoptgrp: "string",
wifi: "string",
});
type: fortios:system:Accprofile
properties:
admintimeout: 0
admintimeoutOverride: string
authgrp: string
cliConfig: string
cliDiagnose: string
cliExec: string
cliGet: string
cliShow: string
comments: string
ftviewgrp: string
fwgrp: string
fwgrpPermission:
address: string
others: string
policy: string
schedule: string
service: string
getAllTables: string
loggrp: string
loggrpPermission:
config: string
dataAccess: string
reportAccess: string
threatWeight: string
name: string
netgrp: string
netgrpPermission:
cfg: string
packetCapture: string
routeCfg: string
scope: string
secfabgrp: string
sysgrp: string
sysgrpPermission:
admin: string
cfg: string
mnt: string
upd: string
systemDiagnostics: string
systemExecuteSsh: string
systemExecuteTelnet: string
utmgrp: string
utmgrpPermission:
antivirus: string
applicationControl: string
casb: string
dataLeakPrevention: string
dataLossPrevention: string
dlp: string
dnsfilter: string
emailfilter: string
endpointControl: string
fileFilter: string
icap: string
ips: string
spamfilter: string
videofilter: string
virtualPatch: string
voip: string
waf: string
webfilter: string
vdomparam: string
vpngrp: string
wanoptgrp: string
wifi: string
Accprofile Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Accprofile resource accepts the following input properties:
- Admintimeout int
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - Authgrp string
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - Cli
Config string - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - Cli
Get string - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - Cli
Show string - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - Comments string
- Comment.
- Ftviewgrp string
- FortiView. Valid values:
none
,read
,read-write
. - Fwgrp string
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - Fwgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Fwgrp Permission - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Loggrp string
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - Loggrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Loggrp Permission - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - Name string
- Profile name.
- Netgrp string
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - Netgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Netgrp Permission - Custom network permission. The structure of
netgrp_permission
block is documented below. - Scope string
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - Secfabgrp string
- Security Fabric. Valid values:
none
,read
,read-write
. - Sysgrp string
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - Sysgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Sysgrp Permission - Custom system permission. The structure of
sysgrp_permission
block is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - System
Execute stringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - System
Execute stringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - Utmgrp string
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - Utmgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Utmgrp Permission - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Vpngrp string
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - Wanoptgrp string
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - Wifi string
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- Admintimeout int
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - Authgrp string
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - Cli
Config string - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - Cli
Get string - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - Cli
Show string - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - Comments string
- Comment.
- Ftviewgrp string
- FortiView. Valid values:
none
,read
,read-write
. - Fwgrp string
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - Fwgrp
Permission AccprofileFwgrp Permission Args - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Loggrp string
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - Loggrp
Permission AccprofileLoggrp Permission Args - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - Name string
- Profile name.
- Netgrp string
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - Netgrp
Permission AccprofileNetgrp Permission Args - Custom network permission. The structure of
netgrp_permission
block is documented below. - Scope string
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - Secfabgrp string
- Security Fabric. Valid values:
none
,read
,read-write
. - Sysgrp string
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - Sysgrp
Permission AccprofileSysgrp Permission Args - Custom system permission. The structure of
sysgrp_permission
block is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - System
Execute stringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - System
Execute stringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - Utmgrp string
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - Utmgrp
Permission AccprofileUtmgrp Permission Args - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Vpngrp string
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - Wanoptgrp string
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - Wifi string
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout Integer
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp String
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli
Config String - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli
Exec String - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli
Get String - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli
Show String - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments String
- Comment.
- ftviewgrp String
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp String
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp
Permission AccprofileFwgrp Permission - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp String
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp
Permission AccprofileLoggrp Permission - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name String
- Profile name.
- netgrp String
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp
Permission AccprofileNetgrp Permission - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope String
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp String
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp String
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp
Permission AccprofileSysgrp Permission - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system
Execute StringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system
Execute StringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp String
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp
Permission AccprofileUtmgrp Permission - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp String
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp String
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi String
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout number
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp string
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli
Config string - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli
Exec string - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli
Get string - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli
Show string - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments string
- Comment.
- ftviewgrp string
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp string
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp
Permission AccprofileFwgrp Permission - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp string
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp
Permission AccprofileLoggrp Permission - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name string
- Profile name.
- netgrp string
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp
Permission AccprofileNetgrp Permission - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope string
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp string
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp string
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp
Permission AccprofileSysgrp Permission - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system
Execute stringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system
Execute stringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp string
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp
Permission AccprofileUtmgrp Permission - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp string
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp string
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi string
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout int
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout_
override str - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp str
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli_
config str - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli_
diagnose str - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli_
exec str - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli_
get str - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli_
show str - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments str
- Comment.
- ftviewgrp str
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp str
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp_
permission AccprofileFwgrp Permission Args - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get_
all_ strtables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp str
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp_
permission AccprofileLoggrp Permission Args - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name str
- Profile name.
- netgrp str
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp_
permission AccprofileNetgrp Permission Args - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope str
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp str
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp str
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp_
permission AccprofileSysgrp Permission Args - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system_
diagnostics str - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system_
execute_ strssh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system_
execute_ strtelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp str
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp_
permission AccprofileUtmgrp Permission Args - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp str
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp str
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi str
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout Number
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp String
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli
Config String - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli
Exec String - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli
Get String - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli
Show String - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments String
- Comment.
- ftviewgrp String
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp String
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp
Permission Property Map - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp String
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp
Permission Property Map - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name String
- Profile name.
- netgrp String
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp
Permission Property Map - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope String
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp String
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp String
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp
Permission Property Map - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system
Execute StringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system
Execute StringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp String
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp
Permission Property Map - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp String
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp String
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi String
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
Outputs
All input properties are implicitly available as output properties. Additionally, the Accprofile resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Accprofile Resource
Get an existing Accprofile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AccprofileState, opts?: CustomResourceOptions): Accprofile
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
admintimeout: Optional[int] = None,
admintimeout_override: Optional[str] = None,
authgrp: Optional[str] = None,
cli_config: Optional[str] = None,
cli_diagnose: Optional[str] = None,
cli_exec: Optional[str] = None,
cli_get: Optional[str] = None,
cli_show: Optional[str] = None,
comments: Optional[str] = None,
ftviewgrp: Optional[str] = None,
fwgrp: Optional[str] = None,
fwgrp_permission: Optional[AccprofileFwgrpPermissionArgs] = None,
get_all_tables: Optional[str] = None,
loggrp: Optional[str] = None,
loggrp_permission: Optional[AccprofileLoggrpPermissionArgs] = None,
name: Optional[str] = None,
netgrp: Optional[str] = None,
netgrp_permission: Optional[AccprofileNetgrpPermissionArgs] = None,
scope: Optional[str] = None,
secfabgrp: Optional[str] = None,
sysgrp: Optional[str] = None,
sysgrp_permission: Optional[AccprofileSysgrpPermissionArgs] = None,
system_diagnostics: Optional[str] = None,
system_execute_ssh: Optional[str] = None,
system_execute_telnet: Optional[str] = None,
utmgrp: Optional[str] = None,
utmgrp_permission: Optional[AccprofileUtmgrpPermissionArgs] = None,
vdomparam: Optional[str] = None,
vpngrp: Optional[str] = None,
wanoptgrp: Optional[str] = None,
wifi: Optional[str] = None) -> Accprofile
func GetAccprofile(ctx *Context, name string, id IDInput, state *AccprofileState, opts ...ResourceOption) (*Accprofile, error)
public static Accprofile Get(string name, Input<string> id, AccprofileState? state, CustomResourceOptions? opts = null)
public static Accprofile get(String name, Output<String> id, AccprofileState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Admintimeout int
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - Authgrp string
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - Cli
Config string - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - Cli
Get string - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - Cli
Show string - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - Comments string
- Comment.
- Ftviewgrp string
- FortiView. Valid values:
none
,read
,read-write
. - Fwgrp string
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - Fwgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Fwgrp Permission - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Loggrp string
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - Loggrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Loggrp Permission - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - Name string
- Profile name.
- Netgrp string
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - Netgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Netgrp Permission - Custom network permission. The structure of
netgrp_permission
block is documented below. - Scope string
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - Secfabgrp string
- Security Fabric. Valid values:
none
,read
,read-write
. - Sysgrp string
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - Sysgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Sysgrp Permission - Custom system permission. The structure of
sysgrp_permission
block is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - System
Execute stringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - System
Execute stringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - Utmgrp string
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - Utmgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Utmgrp Permission - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Vpngrp string
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - Wanoptgrp string
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - Wifi string
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- Admintimeout int
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - Authgrp string
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - Cli
Config string - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - Cli
Get string - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - Cli
Show string - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - Comments string
- Comment.
- Ftviewgrp string
- FortiView. Valid values:
none
,read
,read-write
. - Fwgrp string
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - Fwgrp
Permission AccprofileFwgrp Permission Args - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Loggrp string
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - Loggrp
Permission AccprofileLoggrp Permission Args - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - Name string
- Profile name.
- Netgrp string
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - Netgrp
Permission AccprofileNetgrp Permission Args - Custom network permission. The structure of
netgrp_permission
block is documented below. - Scope string
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - Secfabgrp string
- Security Fabric. Valid values:
none
,read
,read-write
. - Sysgrp string
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - Sysgrp
Permission AccprofileSysgrp Permission Args - Custom system permission. The structure of
sysgrp_permission
block is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - System
Execute stringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - System
Execute stringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - Utmgrp string
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - Utmgrp
Permission AccprofileUtmgrp Permission Args - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Vpngrp string
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - Wanoptgrp string
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - Wifi string
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout Integer
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp String
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli
Config String - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli
Exec String - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli
Get String - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli
Show String - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments String
- Comment.
- ftviewgrp String
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp String
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp
Permission AccprofileFwgrp Permission - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp String
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp
Permission AccprofileLoggrp Permission - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name String
- Profile name.
- netgrp String
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp
Permission AccprofileNetgrp Permission - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope String
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp String
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp String
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp
Permission AccprofileSysgrp Permission - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system
Execute StringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system
Execute StringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp String
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp
Permission AccprofileUtmgrp Permission - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp String
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp String
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi String
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout number
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp string
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli
Config string - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli
Exec string - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli
Get string - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli
Show string - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments string
- Comment.
- ftviewgrp string
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp string
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp
Permission AccprofileFwgrp Permission - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp string
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp
Permission AccprofileLoggrp Permission - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name string
- Profile name.
- netgrp string
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp
Permission AccprofileNetgrp Permission - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope string
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp string
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp string
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp
Permission AccprofileSysgrp Permission - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system
Execute stringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system
Execute stringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp string
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp
Permission AccprofileUtmgrp Permission - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp string
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp string
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi string
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout int
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout_
override str - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp str
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli_
config str - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli_
diagnose str - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli_
exec str - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli_
get str - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli_
show str - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments str
- Comment.
- ftviewgrp str
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp str
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp_
permission AccprofileFwgrp Permission Args - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get_
all_ strtables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp str
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp_
permission AccprofileLoggrp Permission Args - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name str
- Profile name.
- netgrp str
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp_
permission AccprofileNetgrp Permission Args - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope str
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp str
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp str
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp_
permission AccprofileSysgrp Permission Args - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system_
diagnostics str - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system_
execute_ strssh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system_
execute_ strtelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp str
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp_
permission AccprofileUtmgrp Permission Args - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp str
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp str
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi str
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
- admintimeout Number
- Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
- admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values:
enable
,disable
. - authgrp String
- Administrator access to Users and Devices. Valid values:
none
,read
,read-write
. - cli
Config String - Enable/disable permission to run config commands. Valid values:
enable
,disable
. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values:
enable
,disable
. - cli
Exec String - Enable/disable permission to run execute commands. Valid values:
enable
,disable
. - cli
Get String - Enable/disable permission to run get commands. Valid values:
enable
,disable
. - cli
Show String - Enable/disable permission to run show commands. Valid values:
enable
,disable
. - comments String
- Comment.
- ftviewgrp String
- FortiView. Valid values:
none
,read
,read-write
. - fwgrp String
- Administrator access to the Firewall configuration. Valid values:
none
,read
,read-write
,custom
. - fwgrp
Permission Property Map - Custom firewall permission. The structure of
fwgrp_permission
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- loggrp String
- Administrator access to Logging and Reporting including viewing log messages. Valid values:
none
,read
,read-write
,custom
. - loggrp
Permission Property Map - Custom Log & Report permission. The structure of
loggrp_permission
block is documented below. - name String
- Profile name.
- netgrp String
- Network Configuration. Valid values:
none
,read
,read-write
,custom
. - netgrp
Permission Property Map - Custom network permission. The structure of
netgrp_permission
block is documented below. - scope String
- Scope of admin access: global or specific VDOM(s). Valid values:
vdom
,global
. - secfabgrp String
- Security Fabric. Valid values:
none
,read
,read-write
. - sysgrp String
- System Configuration. Valid values:
none
,read
,read-write
,custom
. - sysgrp
Permission Property Map - Custom system permission. The structure of
sysgrp_permission
block is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values:
enable
,disable
. - system
Execute StringSsh - Enable/disable permission to execute SSH commands. Valid values:
enable
,disable
. - system
Execute StringTelnet - Enable/disable permission to execute TELNET commands. Valid values:
enable
,disable
. - utmgrp String
- Administrator access to Security Profiles. Valid values:
none
,read
,read-write
,custom
. - utmgrp
Permission Property Map - Custom Security Profile permissions. The structure of
utmgrp_permission
block is documented below. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- vpngrp String
- Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values:
none
,read
,read-write
. - wanoptgrp String
- Administrator access to WAN Opt & Cache. Valid values:
none
,read
,read-write
. - wifi String
- Administrator access to the WiFi controller and Switch controller. Valid values:
none
,read
,read-write
.
Supporting Types
AccprofileFwgrpPermission, AccprofileFwgrpPermissionArgs
- Address string
- Address Configuration. Valid values:
none
,read
,read-write
. - Others string
- Other Firewall Configuration. Valid values:
none
,read
,read-write
. - Policy string
- Policy Configuration. Valid values:
none
,read
,read-write
. - Schedule string
- Schedule Configuration. Valid values:
none
,read
,read-write
. - Service string
- Service Configuration. Valid values:
none
,read
,read-write
.
- Address string
- Address Configuration. Valid values:
none
,read
,read-write
. - Others string
- Other Firewall Configuration. Valid values:
none
,read
,read-write
. - Policy string
- Policy Configuration. Valid values:
none
,read
,read-write
. - Schedule string
- Schedule Configuration. Valid values:
none
,read
,read-write
. - Service string
- Service Configuration. Valid values:
none
,read
,read-write
.
- address String
- Address Configuration. Valid values:
none
,read
,read-write
. - others String
- Other Firewall Configuration. Valid values:
none
,read
,read-write
. - policy String
- Policy Configuration. Valid values:
none
,read
,read-write
. - schedule String
- Schedule Configuration. Valid values:
none
,read
,read-write
. - service String
- Service Configuration. Valid values:
none
,read
,read-write
.
- address string
- Address Configuration. Valid values:
none
,read
,read-write
. - others string
- Other Firewall Configuration. Valid values:
none
,read
,read-write
. - policy string
- Policy Configuration. Valid values:
none
,read
,read-write
. - schedule string
- Schedule Configuration. Valid values:
none
,read
,read-write
. - service string
- Service Configuration. Valid values:
none
,read
,read-write
.
- address str
- Address Configuration. Valid values:
none
,read
,read-write
. - others str
- Other Firewall Configuration. Valid values:
none
,read
,read-write
. - policy str
- Policy Configuration. Valid values:
none
,read
,read-write
. - schedule str
- Schedule Configuration. Valid values:
none
,read
,read-write
. - service str
- Service Configuration. Valid values:
none
,read
,read-write
.
- address String
- Address Configuration. Valid values:
none
,read
,read-write
. - others String
- Other Firewall Configuration. Valid values:
none
,read
,read-write
. - policy String
- Policy Configuration. Valid values:
none
,read
,read-write
. - schedule String
- Schedule Configuration. Valid values:
none
,read
,read-write
. - service String
- Service Configuration. Valid values:
none
,read
,read-write
.
AccprofileLoggrpPermission, AccprofileLoggrpPermissionArgs
- Config string
- Log & Report configuration. Valid values:
none
,read
,read-write
. - Data
Access string - Log & Report Data Access. Valid values:
none
,read
,read-write
. - Report
Access string - Log & Report Report Access. Valid values:
none
,read
,read-write
. - Threat
Weight string - Log & Report Threat Weight. Valid values:
none
,read
,read-write
.
- Config string
- Log & Report configuration. Valid values:
none
,read
,read-write
. - Data
Access string - Log & Report Data Access. Valid values:
none
,read
,read-write
. - Report
Access string - Log & Report Report Access. Valid values:
none
,read
,read-write
. - Threat
Weight string - Log & Report Threat Weight. Valid values:
none
,read
,read-write
.
- config String
- Log & Report configuration. Valid values:
none
,read
,read-write
. - data
Access String - Log & Report Data Access. Valid values:
none
,read
,read-write
. - report
Access String - Log & Report Report Access. Valid values:
none
,read
,read-write
. - threat
Weight String - Log & Report Threat Weight. Valid values:
none
,read
,read-write
.
- config string
- Log & Report configuration. Valid values:
none
,read
,read-write
. - data
Access string - Log & Report Data Access. Valid values:
none
,read
,read-write
. - report
Access string - Log & Report Report Access. Valid values:
none
,read
,read-write
. - threat
Weight string - Log & Report Threat Weight. Valid values:
none
,read
,read-write
.
- config str
- Log & Report configuration. Valid values:
none
,read
,read-write
. - data_
access str - Log & Report Data Access. Valid values:
none
,read
,read-write
. - report_
access str - Log & Report Report Access. Valid values:
none
,read
,read-write
. - threat_
weight str - Log & Report Threat Weight. Valid values:
none
,read
,read-write
.
- config String
- Log & Report configuration. Valid values:
none
,read
,read-write
. - data
Access String - Log & Report Data Access. Valid values:
none
,read
,read-write
. - report
Access String - Log & Report Report Access. Valid values:
none
,read
,read-write
. - threat
Weight String - Log & Report Threat Weight. Valid values:
none
,read
,read-write
.
AccprofileNetgrpPermission, AccprofileNetgrpPermissionArgs
- Cfg string
- Network Configuration. Valid values:
none
,read
,read-write
. - Packet
Capture string - Packet Capture Configuration. Valid values:
none
,read
,read-write
. - Route
Cfg string - Router Configuration. Valid values:
none
,read
,read-write
.
- Cfg string
- Network Configuration. Valid values:
none
,read
,read-write
. - Packet
Capture string - Packet Capture Configuration. Valid values:
none
,read
,read-write
. - Route
Cfg string - Router Configuration. Valid values:
none
,read
,read-write
.
- cfg String
- Network Configuration. Valid values:
none
,read
,read-write
. - packet
Capture String - Packet Capture Configuration. Valid values:
none
,read
,read-write
. - route
Cfg String - Router Configuration. Valid values:
none
,read
,read-write
.
- cfg string
- Network Configuration. Valid values:
none
,read
,read-write
. - packet
Capture string - Packet Capture Configuration. Valid values:
none
,read
,read-write
. - route
Cfg string - Router Configuration. Valid values:
none
,read
,read-write
.
- cfg str
- Network Configuration. Valid values:
none
,read
,read-write
. - packet_
capture str - Packet Capture Configuration. Valid values:
none
,read
,read-write
. - route_
cfg str - Router Configuration. Valid values:
none
,read
,read-write
.
- cfg String
- Network Configuration. Valid values:
none
,read
,read-write
. - packet
Capture String - Packet Capture Configuration. Valid values:
none
,read
,read-write
. - route
Cfg String - Router Configuration. Valid values:
none
,read
,read-write
.
AccprofileSysgrpPermission, AccprofileSysgrpPermissionArgs
AccprofileUtmgrpPermission, AccprofileUtmgrpPermissionArgs
- Antivirus string
- Antivirus profiles and settings. Valid values:
none
,read
,read-write
. - Application
Control string - Application Control profiles and settings. Valid values:
none
,read
,read-write
. - Casb string
- Inline CASB filter profile and settings Valid values:
none
,read
,read-write
. - Data
Leak stringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - Data
Loss stringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - Dlp string
- DLP profiles and settings. Valid values:
none
,read
,read-write
. - Dnsfilter string
- DNS Filter profiles and settings. Valid values:
none
,read
,read-write
. - Emailfilter string
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - Endpoint
Control string - FortiClient Profiles. Valid values:
none
,read
,read-write
. - File
Filter string - File-filter profiles and settings. Valid values:
none
,read
,read-write
. - Icap string
- ICAP profiles and settings. Valid values:
none
,read
,read-write
. - Ips string
- IPS profiles and settings. Valid values:
none
,read
,read-write
. - Spamfilter string
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - Videofilter string
- Video filter profiles and settings. Valid values:
none
,read
,read-write
. - Virtual
Patch string - Virtual patch profiles and settings. Valid values:
none
,read
,read-write
. - Voip string
- VoIP profiles and settings. Valid values:
none
,read
,read-write
. - Waf string
- Web Application Firewall profiles and settings. Valid values:
none
,read
,read-write
. - Webfilter string
- Web Filter profiles and settings. Valid values:
none
,read
,read-write
.
- Antivirus string
- Antivirus profiles and settings. Valid values:
none
,read
,read-write
. - Application
Control string - Application Control profiles and settings. Valid values:
none
,read
,read-write
. - Casb string
- Inline CASB filter profile and settings Valid values:
none
,read
,read-write
. - Data
Leak stringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - Data
Loss stringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - Dlp string
- DLP profiles and settings. Valid values:
none
,read
,read-write
. - Dnsfilter string
- DNS Filter profiles and settings. Valid values:
none
,read
,read-write
. - Emailfilter string
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - Endpoint
Control string - FortiClient Profiles. Valid values:
none
,read
,read-write
. - File
Filter string - File-filter profiles and settings. Valid values:
none
,read
,read-write
. - Icap string
- ICAP profiles and settings. Valid values:
none
,read
,read-write
. - Ips string
- IPS profiles and settings. Valid values:
none
,read
,read-write
. - Spamfilter string
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - Videofilter string
- Video filter profiles and settings. Valid values:
none
,read
,read-write
. - Virtual
Patch string - Virtual patch profiles and settings. Valid values:
none
,read
,read-write
. - Voip string
- VoIP profiles and settings. Valid values:
none
,read
,read-write
. - Waf string
- Web Application Firewall profiles and settings. Valid values:
none
,read
,read-write
. - Webfilter string
- Web Filter profiles and settings. Valid values:
none
,read
,read-write
.
- antivirus String
- Antivirus profiles and settings. Valid values:
none
,read
,read-write
. - application
Control String - Application Control profiles and settings. Valid values:
none
,read
,read-write
. - casb String
- Inline CASB filter profile and settings Valid values:
none
,read
,read-write
. - data
Leak StringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - data
Loss StringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - dlp String
- DLP profiles and settings. Valid values:
none
,read
,read-write
. - dnsfilter String
- DNS Filter profiles and settings. Valid values:
none
,read
,read-write
. - emailfilter String
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - endpoint
Control String - FortiClient Profiles. Valid values:
none
,read
,read-write
. - file
Filter String - File-filter profiles and settings. Valid values:
none
,read
,read-write
. - icap String
- ICAP profiles and settings. Valid values:
none
,read
,read-write
. - ips String
- IPS profiles and settings. Valid values:
none
,read
,read-write
. - spamfilter String
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - videofilter String
- Video filter profiles and settings. Valid values:
none
,read
,read-write
. - virtual
Patch String - Virtual patch profiles and settings. Valid values:
none
,read
,read-write
. - voip String
- VoIP profiles and settings. Valid values:
none
,read
,read-write
. - waf String
- Web Application Firewall profiles and settings. Valid values:
none
,read
,read-write
. - webfilter String
- Web Filter profiles and settings. Valid values:
none
,read
,read-write
.
- antivirus string
- Antivirus profiles and settings. Valid values:
none
,read
,read-write
. - application
Control string - Application Control profiles and settings. Valid values:
none
,read
,read-write
. - casb string
- Inline CASB filter profile and settings Valid values:
none
,read
,read-write
. - data
Leak stringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - data
Loss stringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - dlp string
- DLP profiles and settings. Valid values:
none
,read
,read-write
. - dnsfilter string
- DNS Filter profiles and settings. Valid values:
none
,read
,read-write
. - emailfilter string
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - endpoint
Control string - FortiClient Profiles. Valid values:
none
,read
,read-write
. - file
Filter string - File-filter profiles and settings. Valid values:
none
,read
,read-write
. - icap string
- ICAP profiles and settings. Valid values:
none
,read
,read-write
. - ips string
- IPS profiles and settings. Valid values:
none
,read
,read-write
. - spamfilter string
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - videofilter string
- Video filter profiles and settings. Valid values:
none
,read
,read-write
. - virtual
Patch string - Virtual patch profiles and settings. Valid values:
none
,read
,read-write
. - voip string
- VoIP profiles and settings. Valid values:
none
,read
,read-write
. - waf string
- Web Application Firewall profiles and settings. Valid values:
none
,read
,read-write
. - webfilter string
- Web Filter profiles and settings. Valid values:
none
,read
,read-write
.
- antivirus str
- Antivirus profiles and settings. Valid values:
none
,read
,read-write
. - application_
control str - Application Control profiles and settings. Valid values:
none
,read
,read-write
. - casb str
- Inline CASB filter profile and settings Valid values:
none
,read
,read-write
. - data_
leak_ strprevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - data_
loss_ strprevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - dlp str
- DLP profiles and settings. Valid values:
none
,read
,read-write
. - dnsfilter str
- DNS Filter profiles and settings. Valid values:
none
,read
,read-write
. - emailfilter str
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - endpoint_
control str - FortiClient Profiles. Valid values:
none
,read
,read-write
. - file_
filter str - File-filter profiles and settings. Valid values:
none
,read
,read-write
. - icap str
- ICAP profiles and settings. Valid values:
none
,read
,read-write
. - ips str
- IPS profiles and settings. Valid values:
none
,read
,read-write
. - spamfilter str
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - videofilter str
- Video filter profiles and settings. Valid values:
none
,read
,read-write
. - virtual_
patch str - Virtual patch profiles and settings. Valid values:
none
,read
,read-write
. - voip str
- VoIP profiles and settings. Valid values:
none
,read
,read-write
. - waf str
- Web Application Firewall profiles and settings. Valid values:
none
,read
,read-write
. - webfilter str
- Web Filter profiles and settings. Valid values:
none
,read
,read-write
.
- antivirus String
- Antivirus profiles and settings. Valid values:
none
,read
,read-write
. - application
Control String - Application Control profiles and settings. Valid values:
none
,read
,read-write
. - casb String
- Inline CASB filter profile and settings Valid values:
none
,read
,read-write
. - data
Leak StringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - data
Loss StringPrevention - DLP profiles and settings. Valid values:
none
,read
,read-write
. - dlp String
- DLP profiles and settings. Valid values:
none
,read
,read-write
. - dnsfilter String
- DNS Filter profiles and settings. Valid values:
none
,read
,read-write
. - emailfilter String
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - endpoint
Control String - FortiClient Profiles. Valid values:
none
,read
,read-write
. - file
Filter String - File-filter profiles and settings. Valid values:
none
,read
,read-write
. - icap String
- ICAP profiles and settings. Valid values:
none
,read
,read-write
. - ips String
- IPS profiles and settings. Valid values:
none
,read
,read-write
. - spamfilter String
- AntiSpam filter and settings. Valid values:
none
,read
,read-write
. - videofilter String
- Video filter profiles and settings. Valid values:
none
,read
,read-write
. - virtual
Patch String - Virtual patch profiles and settings. Valid values:
none
,read
,read-write
. - voip String
- VoIP profiles and settings. Valid values:
none
,read
,read-write
. - waf String
- Web Application Firewall profiles and settings. Valid values:
none
,read
,read-write
. - webfilter String
- Web Filter profiles and settings. Valid values:
none
,read
,read-write
.
Import
System Accprofile can be imported using any of these accepted formats:
$ pulumi import fortios:system/accprofile:Accprofile labelname {{name}}
If you do not want to import arguments of block:
$ export “FORTIOS_IMPORT_TABLE”=“false”
$ pulumi import fortios:system/accprofile:Accprofile labelname {{name}}
$ unset “FORTIOS_IMPORT_TABLE”
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- fortios pulumiverse/pulumi-fortios
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
fortios
Terraform Provider.