Cisco Meraki v0.3.2 published on Tuesday, Sep 24, 2024 by Pulumi
meraki.organizations.getLoginSecurity
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as meraki from "@pulumi/meraki";
const example = meraki.organizations.getLoginSecurity({
organizationId: "string",
});
export const merakiOrganizationsLoginSecurityExample = example.then(example => example.item);
import pulumi
import pulumi_meraki as meraki
example = meraki.organizations.get_login_security(organization_id="string")
pulumi.export("merakiOrganizationsLoginSecurityExample", example.item)
package main
import (
"github.com/pulumi/pulumi-meraki/sdk/go/meraki/organizations"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := organizations.LookupLoginSecurity(ctx, &organizations.LookupLoginSecurityArgs{
OrganizationId: "string",
}, nil)
if err != nil {
return err
}
ctx.Export("merakiOrganizationsLoginSecurityExample", example.Item)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Meraki = Pulumi.Meraki;
return await Deployment.RunAsync(() =>
{
var example = Meraki.Organizations.GetLoginSecurity.Invoke(new()
{
OrganizationId = "string",
});
return new Dictionary<string, object?>
{
["merakiOrganizationsLoginSecurityExample"] = example.Apply(getLoginSecurityResult => getLoginSecurityResult.Item),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.organizations.OrganizationsFunctions;
import com.pulumi.meraki.organizations.inputs.GetLoginSecurityArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var example = OrganizationsFunctions.getLoginSecurity(GetLoginSecurityArgs.builder()
.organizationId("string")
.build());
ctx.export("merakiOrganizationsLoginSecurityExample", example.applyValue(getLoginSecurityResult -> getLoginSecurityResult.item()));
}
}
variables:
example:
fn::invoke:
Function: meraki:organizations:getLoginSecurity
Arguments:
organizationId: string
outputs:
merakiOrganizationsLoginSecurityExample: ${example.item}
Using getLoginSecurity
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getLoginSecurity(args: GetLoginSecurityArgs, opts?: InvokeOptions): Promise<GetLoginSecurityResult>
function getLoginSecurityOutput(args: GetLoginSecurityOutputArgs, opts?: InvokeOptions): Output<GetLoginSecurityResult>
def get_login_security(organization_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetLoginSecurityResult
def get_login_security_output(organization_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetLoginSecurityResult]
func LookupLoginSecurity(ctx *Context, args *LookupLoginSecurityArgs, opts ...InvokeOption) (*LookupLoginSecurityResult, error)
func LookupLoginSecurityOutput(ctx *Context, args *LookupLoginSecurityOutputArgs, opts ...InvokeOption) LookupLoginSecurityResultOutput
> Note: This function is named LookupLoginSecurity
in the Go SDK.
public static class GetLoginSecurity
{
public static Task<GetLoginSecurityResult> InvokeAsync(GetLoginSecurityArgs args, InvokeOptions? opts = null)
public static Output<GetLoginSecurityResult> Invoke(GetLoginSecurityInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetLoginSecurityResult> getLoginSecurity(GetLoginSecurityArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: meraki:organizations/getLoginSecurity:getLoginSecurity
arguments:
# arguments dictionary
The following arguments are supported:
- Organization
Id string - organizationId path parameter. Organization ID
- Organization
Id string - organizationId path parameter. Organization ID
- organization
Id String - organizationId path parameter. Organization ID
- organization
Id string - organizationId path parameter. Organization ID
- organization_
id str - organizationId path parameter. Organization ID
- organization
Id String - organizationId path parameter. Organization ID
getLoginSecurity Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Login Security Item - Organization
Id string - organizationId path parameter. Organization ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Login Security Item - Organization
Id string - organizationId path parameter. Organization ID
- id String
- The provider-assigned unique ID for this managed resource.
- item
Get
Login Security Item - organization
Id String - organizationId path parameter. Organization ID
- id string
- The provider-assigned unique ID for this managed resource.
- item
Get
Login Security Item - organization
Id string - organizationId path parameter. Organization ID
- id str
- The provider-assigned unique ID for this managed resource.
- item
Get
Login Security Item - organization_
id str - organizationId path parameter. Organization ID
- id String
- The provider-assigned unique ID for this managed resource.
- item Property Map
- organization
Id String - organizationId path parameter. Organization ID
Supporting Types
GetLoginSecurityItem
- Account
Lockout intAttempts - Number of consecutive failed login attempts after which users' accounts will be locked.
- Api
Authentication GetLogin Security Item Api Authentication - Details for indicating whether organization will restrict access to API (but not Dashboard) to certain IP addresses.
- Enforce
Account boolLockout - Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
- Enforce
Different boolPasswords - Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
- Enforce
Idle boolTimeout - Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
- Enforce
Login boolIp Ranges - Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
- Enforce
Password boolExpiration - Boolean indicating whether users are forced to change their password every X number of days.
- Enforce
Strong boolPasswords - Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
- Enforce
Two boolFactor Auth - Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
- Idle
Timeout intMinutes - Number of minutes users can remain idle before being logged out of their accounts.
- Login
Ip List<string>Ranges - List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
- Num
Different intPasswords - Number of recent passwords that new password must be distinct from.
- Password
Expiration intDays - Number of days after which users will be forced to change their password.
- Account
Lockout intAttempts - Number of consecutive failed login attempts after which users' accounts will be locked.
- Api
Authentication GetLogin Security Item Api Authentication - Details for indicating whether organization will restrict access to API (but not Dashboard) to certain IP addresses.
- Enforce
Account boolLockout - Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
- Enforce
Different boolPasswords - Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
- Enforce
Idle boolTimeout - Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
- Enforce
Login boolIp Ranges - Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
- Enforce
Password boolExpiration - Boolean indicating whether users are forced to change their password every X number of days.
- Enforce
Strong boolPasswords - Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
- Enforce
Two boolFactor Auth - Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
- Idle
Timeout intMinutes - Number of minutes users can remain idle before being logged out of their accounts.
- Login
Ip []stringRanges - List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
- Num
Different intPasswords - Number of recent passwords that new password must be distinct from.
- Password
Expiration intDays - Number of days after which users will be forced to change their password.
- account
Lockout IntegerAttempts - Number of consecutive failed login attempts after which users' accounts will be locked.
- api
Authentication GetLogin Security Item Api Authentication - Details for indicating whether organization will restrict access to API (but not Dashboard) to certain IP addresses.
- enforce
Account BooleanLockout - Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
- enforce
Different BooleanPasswords - Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
- enforce
Idle BooleanTimeout - Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
- enforce
Login BooleanIp Ranges - Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
- enforce
Password BooleanExpiration - Boolean indicating whether users are forced to change their password every X number of days.
- enforce
Strong BooleanPasswords - Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
- enforce
Two BooleanFactor Auth - Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
- idle
Timeout IntegerMinutes - Number of minutes users can remain idle before being logged out of their accounts.
- login
Ip List<String>Ranges - List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
- num
Different IntegerPasswords - Number of recent passwords that new password must be distinct from.
- password
Expiration IntegerDays - Number of days after which users will be forced to change their password.
- account
Lockout numberAttempts - Number of consecutive failed login attempts after which users' accounts will be locked.
- api
Authentication GetLogin Security Item Api Authentication - Details for indicating whether organization will restrict access to API (but not Dashboard) to certain IP addresses.
- enforce
Account booleanLockout - Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
- enforce
Different booleanPasswords - Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
- enforce
Idle booleanTimeout - Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
- enforce
Login booleanIp Ranges - Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
- enforce
Password booleanExpiration - Boolean indicating whether users are forced to change their password every X number of days.
- enforce
Strong booleanPasswords - Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
- enforce
Two booleanFactor Auth - Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
- idle
Timeout numberMinutes - Number of minutes users can remain idle before being logged out of their accounts.
- login
Ip string[]Ranges - List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
- num
Different numberPasswords - Number of recent passwords that new password must be distinct from.
- password
Expiration numberDays - Number of days after which users will be forced to change their password.
- account_
lockout_ intattempts - Number of consecutive failed login attempts after which users' accounts will be locked.
- api_
authentication GetLogin Security Item Api Authentication - Details for indicating whether organization will restrict access to API (but not Dashboard) to certain IP addresses.
- enforce_
account_ boollockout - Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
- enforce_
different_ boolpasswords - Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
- enforce_
idle_ booltimeout - Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
- enforce_
login_ boolip_ ranges - Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
- enforce_
password_ boolexpiration - Boolean indicating whether users are forced to change their password every X number of days.
- enforce_
strong_ boolpasswords - Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
- enforce_
two_ boolfactor_ auth - Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
- idle_
timeout_ intminutes - Number of minutes users can remain idle before being logged out of their accounts.
- login_
ip_ Sequence[str]ranges - List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
- num_
different_ intpasswords - Number of recent passwords that new password must be distinct from.
- password_
expiration_ intdays - Number of days after which users will be forced to change their password.
- account
Lockout NumberAttempts - Number of consecutive failed login attempts after which users' accounts will be locked.
- api
Authentication Property Map - Details for indicating whether organization will restrict access to API (but not Dashboard) to certain IP addresses.
- enforce
Account BooleanLockout - Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
- enforce
Different BooleanPasswords - Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
- enforce
Idle BooleanTimeout - Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
- enforce
Login BooleanIp Ranges - Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
- enforce
Password BooleanExpiration - Boolean indicating whether users are forced to change their password every X number of days.
- enforce
Strong BooleanPasswords - Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
- enforce
Two BooleanFactor Auth - Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
- idle
Timeout NumberMinutes - Number of minutes users can remain idle before being logged out of their accounts.
- login
Ip List<String>Ranges - List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
- num
Different NumberPasswords - Number of recent passwords that new password must be distinct from.
- password
Expiration NumberDays - Number of days after which users will be forced to change their password.
GetLoginSecurityItemApiAuthentication
- Ip
Restrictions GetFor Keys Login Security Item Api Authentication Ip Restrictions For Keys - Details for API-only IP restrictions.
- Ip
Restrictions GetFor Keys Login Security Item Api Authentication Ip Restrictions For Keys - Details for API-only IP restrictions.
- ip
Restrictions GetFor Keys Login Security Item Api Authentication Ip Restrictions For Keys - Details for API-only IP restrictions.
- ip
Restrictions GetFor Keys Login Security Item Api Authentication Ip Restrictions For Keys - Details for API-only IP restrictions.
- ip_
restrictions_ Getfor_ keys Login Security Item Api Authentication Ip Restrictions For Keys - Details for API-only IP restrictions.
- ip
Restrictions Property MapFor Keys - Details for API-only IP restrictions.
GetLoginSecurityItemApiAuthenticationIpRestrictionsForKeys
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
meraki
Terraform Provider.