azure-native.videoanalyzer.AccessPolicy
Explore with Pulumi AI
Access policies help define the authentication rules, and control access to specific video resources. Azure REST API version: 2021-11-01-preview. Prior API version in Azure Native 1.x: 2021-05-01-preview.
Example Usage
Register access policy entity.
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() => 
{
    var accessPolicy = new AzureNative.VideoAnalyzer.AccessPolicy("accessPolicy", new()
    {
        AccessPolicyName = "accessPolicyName1",
        AccountName = "testaccount2",
        Authentication = new AzureNative.VideoAnalyzer.Inputs.JwtAuthenticationArgs
        {
            Audiences = new[]
            {
                "audience1",
            },
            Claims = new[]
            {
                new AzureNative.VideoAnalyzer.Inputs.TokenClaimArgs
                {
                    Name = "claimname1",
                    Value = "claimvalue1",
                },
                new AzureNative.VideoAnalyzer.Inputs.TokenClaimArgs
                {
                    Name = "claimname2",
                    Value = "claimvalue2",
                },
            },
            Issuers = new[]
            {
                "issuer1",
                "issuer2",
            },
            Keys = 
            {
                new AzureNative.VideoAnalyzer.Inputs.RsaTokenKeyArgs
                {
                    Alg = AzureNative.VideoAnalyzer.AccessPolicyRsaAlgo.RS256,
                    E = "ZLFzZTY0IQ==",
                    Kid = "123",
                    N = "YmFzZTY0IQ==",
                    Type = "#Microsoft.VideoAnalyzer.RsaTokenKey",
                },
                new AzureNative.VideoAnalyzer.Inputs.EccTokenKeyArgs
                {
                    Alg = AzureNative.VideoAnalyzer.AccessPolicyEccAlgo.ES256,
                    Kid = "124",
                    Type = "#Microsoft.VideoAnalyzer.EccTokenKey",
                    X = "XX==",
                    Y = "YY==",
                },
            },
            Type = "#Microsoft.VideoAnalyzer.JwtAuthentication",
        },
        ResourceGroupName = "testrg",
    });
});
package main
import (
	videoanalyzer "github.com/pulumi/pulumi-azure-native-sdk/videoanalyzer/v2"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := videoanalyzer.NewAccessPolicy(ctx, "accessPolicy", &videoanalyzer.AccessPolicyArgs{
			AccessPolicyName: pulumi.String("accessPolicyName1"),
			AccountName:      pulumi.String("testaccount2"),
			Authentication: &videoanalyzer.JwtAuthenticationArgs{
				Audiences: pulumi.StringArray{
					pulumi.String("audience1"),
				},
				Claims: videoanalyzer.TokenClaimArray{
					&videoanalyzer.TokenClaimArgs{
						Name:  pulumi.String("claimname1"),
						Value: pulumi.String("claimvalue1"),
					},
					&videoanalyzer.TokenClaimArgs{
						Name:  pulumi.String("claimname2"),
						Value: pulumi.String("claimvalue2"),
					},
				},
				Issuers: pulumi.StringArray{
					pulumi.String("issuer1"),
					pulumi.String("issuer2"),
				},
				Keys: pulumi.Array{
					videoanalyzer.RsaTokenKey{
						Alg:  videoanalyzer.AccessPolicyRsaAlgoRS256,
						E:    "ZLFzZTY0IQ==",
						Kid:  "123",
						N:    "YmFzZTY0IQ==",
						Type: "#Microsoft.VideoAnalyzer.RsaTokenKey",
					},
					videoanalyzer.EccTokenKey{
						Alg:  videoanalyzer.AccessPolicyEccAlgoES256,
						Kid:  "124",
						Type: "#Microsoft.VideoAnalyzer.EccTokenKey",
						X:    "XX==",
						Y:    "YY==",
					},
				},
				Type: pulumi.String("#Microsoft.VideoAnalyzer.JwtAuthentication"),
			},
			ResourceGroupName: pulumi.String("testrg"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.videoanalyzer.AccessPolicy;
import com.pulumi.azurenative.videoanalyzer.AccessPolicyArgs;
import com.pulumi.azurenative.videoanalyzer.inputs.JwtAuthenticationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var accessPolicy = new AccessPolicy("accessPolicy", AccessPolicyArgs.builder()
            .accessPolicyName("accessPolicyName1")
            .accountName("testaccount2")
            .authentication(JwtAuthenticationArgs.builder()
                .audiences("audience1")
                .claims(                
                    TokenClaimArgs.builder()
                        .name("claimname1")
                        .value("claimvalue1")
                        .build(),
                    TokenClaimArgs.builder()
                        .name("claimname2")
                        .value("claimvalue2")
                        .build())
                .issuers(                
                    "issuer1",
                    "issuer2")
                .keys(                
                    EccTokenKeyArgs.builder()
                        .alg("RS256")
                        .e("ZLFzZTY0IQ==")
                        .kid("123")
                        .n("YmFzZTY0IQ==")
                        .type("#Microsoft.VideoAnalyzer.RsaTokenKey")
                        .build(),
                    EccTokenKeyArgs.builder()
                        .alg("ES256")
                        .kid("124")
                        .type("#Microsoft.VideoAnalyzer.EccTokenKey")
                        .x("XX==")
                        .y("YY==")
                        .build())
                .type("#Microsoft.VideoAnalyzer.JwtAuthentication")
                .build())
            .resourceGroupName("testrg")
            .build());
    }
}
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const accessPolicy = new azure_native.videoanalyzer.AccessPolicy("accessPolicy", {
    accessPolicyName: "accessPolicyName1",
    accountName: "testaccount2",
    authentication: {
        audiences: ["audience1"],
        claims: [
            {
                name: "claimname1",
                value: "claimvalue1",
            },
            {
                name: "claimname2",
                value: "claimvalue2",
            },
        ],
        issuers: [
            "issuer1",
            "issuer2",
        ],
        keys: [
            {
                alg: azure_native.videoanalyzer.AccessPolicyRsaAlgo.RS256,
                e: "ZLFzZTY0IQ==",
                kid: "123",
                n: "YmFzZTY0IQ==",
                type: "#Microsoft.VideoAnalyzer.RsaTokenKey",
            },
            {
                alg: azure_native.videoanalyzer.AccessPolicyEccAlgo.ES256,
                kid: "124",
                type: "#Microsoft.VideoAnalyzer.EccTokenKey",
                x: "XX==",
                y: "YY==",
            },
        ],
        type: "#Microsoft.VideoAnalyzer.JwtAuthentication",
    },
    resourceGroupName: "testrg",
});
import pulumi
import pulumi_azure_native as azure_native
access_policy = azure_native.videoanalyzer.AccessPolicy("accessPolicy",
    access_policy_name="accessPolicyName1",
    account_name="testaccount2",
    authentication={
        "audiences": ["audience1"],
        "claims": [
            {
                "name": "claimname1",
                "value": "claimvalue1",
            },
            {
                "name": "claimname2",
                "value": "claimvalue2",
            },
        ],
        "issuers": [
            "issuer1",
            "issuer2",
        ],
        "keys": [
            {
                "alg": azure_native.videoanalyzer.AccessPolicyRsaAlgo.RS256,
                "e": "ZLFzZTY0IQ==",
                "kid": "123",
                "n": "YmFzZTY0IQ==",
                "type": "#Microsoft.VideoAnalyzer.RsaTokenKey",
            },
            {
                "alg": azure_native.videoanalyzer.AccessPolicyEccAlgo.ES256,
                "kid": "124",
                "type": "#Microsoft.VideoAnalyzer.EccTokenKey",
                "x": "XX==",
                "y": "YY==",
            },
        ],
        "type": "#Microsoft.VideoAnalyzer.JwtAuthentication",
    },
    resource_group_name="testrg")
resources:
  accessPolicy:
    type: azure-native:videoanalyzer:AccessPolicy
    properties:
      accessPolicyName: accessPolicyName1
      accountName: testaccount2
      authentication:
        audiences:
          - audience1
        claims:
          - name: claimname1
            value: claimvalue1
          - name: claimname2
            value: claimvalue2
        issuers:
          - issuer1
          - issuer2
        keys:
          - alg: RS256
            e: ZLFzZTY0IQ==
            kid: '123'
            n: YmFzZTY0IQ==
            type: '#Microsoft.VideoAnalyzer.RsaTokenKey'
          - alg: ES256
            kid: '124'
            type: '#Microsoft.VideoAnalyzer.EccTokenKey'
            x: XX==
            y: YY==
        type: '#Microsoft.VideoAnalyzer.JwtAuthentication'
      resourceGroupName: testrg
Create AccessPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AccessPolicy(name: string, args: AccessPolicyArgs, opts?: CustomResourceOptions);@overload
def AccessPolicy(resource_name: str,
                 args: AccessPolicyArgs,
                 opts: Optional[ResourceOptions] = None)
@overload
def AccessPolicy(resource_name: str,
                 opts: Optional[ResourceOptions] = None,
                 account_name: Optional[str] = None,
                 resource_group_name: Optional[str] = None,
                 access_policy_name: Optional[str] = None,
                 authentication: Optional[JwtAuthenticationArgs] = None,
                 role: Optional[Union[str, AccessPolicyRole]] = None)func NewAccessPolicy(ctx *Context, name string, args AccessPolicyArgs, opts ...ResourceOption) (*AccessPolicy, error)public AccessPolicy(string name, AccessPolicyArgs args, CustomResourceOptions? opts = null)
public AccessPolicy(String name, AccessPolicyArgs args)
public AccessPolicy(String name, AccessPolicyArgs args, CustomResourceOptions options)
type: azure-native:videoanalyzer:AccessPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AccessPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var exampleaccessPolicyResourceResourceFromVideoanalyzer = new AzureNative.VideoAnalyzer.AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer", new()
{
    AccountName = "string",
    ResourceGroupName = "string",
    AccessPolicyName = "string",
    Authentication = new AzureNative.VideoAnalyzer.Inputs.JwtAuthenticationArgs
    {
        Type = "#Microsoft.VideoAnalyzer.JwtAuthentication",
        Audiences = new[]
        {
            "string",
        },
        Claims = new[]
        {
            new AzureNative.VideoAnalyzer.Inputs.TokenClaimArgs
            {
                Name = "string",
                Value = "string",
            },
        },
        Issuers = new[]
        {
            "string",
        },
        Keys = new[]
        {
            new AzureNative.VideoAnalyzer.Inputs.EccTokenKeyArgs
            {
                Alg = "string",
                Kid = "string",
                Type = "#Microsoft.VideoAnalyzer.EccTokenKey",
                X = "string",
                Y = "string",
            },
        },
    },
    Role = "string",
});
example, err := videoanalyzer.NewAccessPolicy(ctx, "exampleaccessPolicyResourceResourceFromVideoanalyzer", &videoanalyzer.AccessPolicyArgs{
	AccountName:       pulumi.String("string"),
	ResourceGroupName: pulumi.String("string"),
	AccessPolicyName:  pulumi.String("string"),
	Authentication: &videoanalyzer.JwtAuthenticationArgs{
		Type: pulumi.String("#Microsoft.VideoAnalyzer.JwtAuthentication"),
		Audiences: pulumi.StringArray{
			pulumi.String("string"),
		},
		Claims: videoanalyzer.TokenClaimArray{
			&videoanalyzer.TokenClaimArgs{
				Name:  pulumi.String("string"),
				Value: pulumi.String("string"),
			},
		},
		Issuers: pulumi.StringArray{
			pulumi.String("string"),
		},
		Keys: pulumi.Array{
			videoanalyzer.EccTokenKey{
				Alg:  "string",
				Kid:  "string",
				Type: "#Microsoft.VideoAnalyzer.EccTokenKey",
				X:    "string",
				Y:    "string",
			},
		},
	},
	Role: pulumi.String("string"),
})
var exampleaccessPolicyResourceResourceFromVideoanalyzer = new AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer", AccessPolicyArgs.builder()
    .accountName("string")
    .resourceGroupName("string")
    .accessPolicyName("string")
    .authentication(JwtAuthenticationArgs.builder()
        .type("#Microsoft.VideoAnalyzer.JwtAuthentication")
        .audiences("string")
        .claims(TokenClaimArgs.builder()
            .name("string")
            .value("string")
            .build())
        .issuers("string")
        .keys(EccTokenKeyArgs.builder()
            .alg("string")
            .kid("string")
            .type("#Microsoft.VideoAnalyzer.EccTokenKey")
            .x("string")
            .y("string")
            .build())
        .build())
    .role("string")
    .build());
exampleaccess_policy_resource_resource_from_videoanalyzer = azure_native.videoanalyzer.AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer",
    account_name="string",
    resource_group_name="string",
    access_policy_name="string",
    authentication={
        "type": "#Microsoft.VideoAnalyzer.JwtAuthentication",
        "audiences": ["string"],
        "claims": [{
            "name": "string",
            "value": "string",
        }],
        "issuers": ["string"],
        "keys": [{
            "alg": "string",
            "kid": "string",
            "type": "#Microsoft.VideoAnalyzer.EccTokenKey",
            "x": "string",
            "y": "string",
        }],
    },
    role="string")
const exampleaccessPolicyResourceResourceFromVideoanalyzer = new azure_native.videoanalyzer.AccessPolicy("exampleaccessPolicyResourceResourceFromVideoanalyzer", {
    accountName: "string",
    resourceGroupName: "string",
    accessPolicyName: "string",
    authentication: {
        type: "#Microsoft.VideoAnalyzer.JwtAuthentication",
        audiences: ["string"],
        claims: [{
            name: "string",
            value: "string",
        }],
        issuers: ["string"],
        keys: [{
            alg: "string",
            kid: "string",
            type: "#Microsoft.VideoAnalyzer.EccTokenKey",
            x: "string",
            y: "string",
        }],
    },
    role: "string",
});
type: azure-native:videoanalyzer:AccessPolicy
properties:
    accessPolicyName: string
    accountName: string
    authentication:
        audiences:
            - string
        claims:
            - name: string
              value: string
        issuers:
            - string
        keys:
            - alg: string
              kid: string
              type: '#Microsoft.VideoAnalyzer.EccTokenKey'
              x: string
              "y": string
        type: '#Microsoft.VideoAnalyzer.JwtAuthentication'
    resourceGroupName: string
    role: string
AccessPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AccessPolicy resource accepts the following input properties:
- AccountName string
- The Azure Video Analyzer account name.
- ResourceGroup stringName 
- The name of the resource group. The name is case insensitive.
- AccessPolicy stringName 
- The Access Policy name.
- Authentication
Pulumi.Azure Native. Video Analyzer. Inputs. Jwt Authentication 
- Authentication method to be used when validating client API access.
- Role
string | Pulumi.Azure Native. Video Analyzer. Access Policy Role 
- Defines the access level granted by this policy.
- AccountName string
- The Azure Video Analyzer account name.
- ResourceGroup stringName 
- The name of the resource group. The name is case insensitive.
- AccessPolicy stringName 
- The Access Policy name.
- Authentication
JwtAuthentication Args 
- Authentication method to be used when validating client API access.
- Role
string | AccessPolicy Role 
- Defines the access level granted by this policy.
- accountName String
- The Azure Video Analyzer account name.
- resourceGroup StringName 
- The name of the resource group. The name is case insensitive.
- accessPolicy StringName 
- The Access Policy name.
- authentication
JwtAuthentication 
- Authentication method to be used when validating client API access.
- role
String | AccessPolicy Role 
- Defines the access level granted by this policy.
- accountName string
- The Azure Video Analyzer account name.
- resourceGroup stringName 
- The name of the resource group. The name is case insensitive.
- accessPolicy stringName 
- The Access Policy name.
- authentication
JwtAuthentication 
- Authentication method to be used when validating client API access.
- role
string | AccessPolicy Role 
- Defines the access level granted by this policy.
- account_name str
- The Azure Video Analyzer account name.
- resource_group_ strname 
- The name of the resource group. The name is case insensitive.
- access_policy_ strname 
- The Access Policy name.
- authentication
JwtAuthentication Args 
- Authentication method to be used when validating client API access.
- role
str | AccessPolicy Role 
- Defines the access level granted by this policy.
- accountName String
- The Azure Video Analyzer account name.
- resourceGroup StringName 
- The name of the resource group. The name is case insensitive.
- accessPolicy StringName 
- The Access Policy name.
- authentication Property Map
- Authentication method to be used when validating client API access.
- role String | "Reader"
- Defines the access level granted by this policy.
Outputs
All input properties are implicitly available as output properties. Additionally, the AccessPolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The name of the resource
- SystemData Pulumi.Azure Native. Video Analyzer. Outputs. System Data Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The name of the resource
- SystemData SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The name of the resource
- systemData SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id string
- The provider-assigned unique ID for this managed resource.
- name string
- The name of the resource
- systemData SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id str
- The provider-assigned unique ID for this managed resource.
- name str
- The name of the resource
- system_data SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type str
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The name of the resource
- systemData Property Map
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
Supporting Types
AccessPolicyEccAlgo, AccessPolicyEccAlgoArgs        
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- AccessPolicy Ecc Algo ES256 
- ES256ES265
- AccessPolicy Ecc Algo ES384 
- ES384ES384
- AccessPolicy Ecc Algo ES512 
- ES512ES512
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- ES256
- ES256ES265
- ES384
- ES384ES384
- ES512
- ES512ES512
- "ES256"
- ES256ES265
- "ES384"
- ES384ES384
- "ES512"
- ES512ES512
AccessPolicyRole, AccessPolicyRoleArgs      
- Reader
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- AccessPolicy Role Reader 
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- Reader
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- Reader
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- READER
- ReaderReader role allows for read-only operations to be performed through the client APIs.
- "Reader"
- ReaderReader role allows for read-only operations to be performed through the client APIs.
AccessPolicyRsaAlgo, AccessPolicyRsaAlgoArgs        
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- AccessPolicy Rsa Algo RS256 
- RS256RS256
- AccessPolicy Rsa Algo RS384 
- RS384RS384
- AccessPolicy Rsa Algo RS512 
- RS512RS512
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- RS256
- RS256RS256
- RS384
- RS384RS384
- RS512
- RS512RS512
- "RS256"
- RS256RS256
- "RS384"
- RS384RS384
- "RS512"
- RS512RS512
EccTokenKey, EccTokenKeyArgs      
- Alg
string | Pulumi.Azure Native. Video Analyzer. Access Policy Ecc Algo 
- Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- X string
- X coordinate.
- Y string
- Y coordinate.
- Alg
string | AccessPolicy Ecc Algo 
- Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- X string
- X coordinate.
- Y string
- Y coordinate.
- alg
String | AccessPolicy Ecc Algo 
- Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x String
- X coordinate.
- y String
- Y coordinate.
- alg
string | AccessPolicy Ecc Algo 
- Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x string
- X coordinate.
- y string
- Y coordinate.
- alg
str | AccessPolicy Ecc Algo 
- Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid str
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x str
- X coordinate.
- y str
- Y coordinate.
- alg String | "ES256" | "ES384" | "ES512"
- Elliptical curve algorithm to be used: ES256, ES384 or ES512.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- x String
- X coordinate.
- y String
- Y coordinate.
EccTokenKeyResponse, EccTokenKeyResponseArgs        
JwtAuthentication, JwtAuthenticationArgs    
- Audiences List<string>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
List<Pulumi.Azure Native. Video Analyzer. Inputs. Token Claim> 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers List<string>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys
List<Union<Pulumi.Azure Native. Video Analyzer. Inputs. Ecc Token Key, Pulumi. Azure Native. Video Analyzer. Inputs. Rsa Token Key>> 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- Audiences []string
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
[]TokenClaim 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers []string
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys []interface{}
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
List<TokenClaim> 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
List<Either<EccToken Key,Rsa Token Key>> 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences string[]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
TokenClaim[] 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers string[]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
(EccToken Key | Rsa Token Key)[] 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences Sequence[str]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
Sequence[TokenClaim] 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers Sequence[str]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
Sequence[Union[EccToken Key, Rsa Token Key]] 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims List<Property Map>
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys List<Property Map | Property Map>
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
JwtAuthenticationResponse, JwtAuthenticationResponseArgs      
- Audiences List<string>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
List<Pulumi.Azure Native. Video Analyzer. Inputs. Token Claim Response> 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers List<string>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys
List<Union<Pulumi.Azure Native. Video Analyzer. Inputs. Ecc Token Key Response, Pulumi. Azure Native. Video Analyzer. Inputs. Rsa Token Key Response>> 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- Audiences []string
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- Claims
[]TokenClaim Response 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- Issuers []string
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- Keys []interface{}
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
List<TokenClaim Response> 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
List<Either<EccToken Key Response,Rsa Token Key Response>> 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences string[]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
TokenClaim Response[] 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers string[]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
(EccToken Key Response | Rsa Token Key Response)[] 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences Sequence[str]
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims
Sequence[TokenClaim Response] 
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers Sequence[str]
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys
Sequence[Union[EccToken Key Response, Rsa Token Key Response]] 
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
- audiences List<String>
- List of expected token audiences. Token audience is valid if it matches at least one of the given values.
- claims List<Property Map>
- List of additional token claims to be validated. Token must contains all claims and respective values for it to be valid.
- issuers List<String>
- List of expected token issuers. Token issuer is valid if it matches at least one of the given values.
- keys List<Property Map | Property Map>
- List of keys which can be used to validate access tokens. Having multiple keys allow for seamless key rotation of the token signing key. Token signature must match exactly one key.
RsaTokenKey, RsaTokenKeyArgs      
- Alg
string | Pulumi.Azure Native. Video Analyzer. Access Policy Rsa Algo 
- RSA algorithm to be used: RS256, RS384 or RS512.
- E string
- RSA public key exponent.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- N string
- RSA public key modulus.
- Alg
string | AccessPolicy Rsa Algo 
- RSA algorithm to be used: RS256, RS384 or RS512.
- E string
- RSA public key exponent.
- Kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- N string
- RSA public key modulus.
- alg
String | AccessPolicy Rsa Algo 
- RSA algorithm to be used: RS256, RS384 or RS512.
- e String
- RSA public key exponent.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n String
- RSA public key modulus.
- alg
string | AccessPolicy Rsa Algo 
- RSA algorithm to be used: RS256, RS384 or RS512.
- e string
- RSA public key exponent.
- kid string
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n string
- RSA public key modulus.
- alg
str | AccessPolicy Rsa Algo 
- RSA algorithm to be used: RS256, RS384 or RS512.
- e str
- RSA public key exponent.
- kid str
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n str
- RSA public key modulus.
- alg String | "RS256" | "RS384" | "RS512"
- RSA algorithm to be used: RS256, RS384 or RS512.
- e String
- RSA public key exponent.
- kid String
- JWT token key id. Validation keys are looked up based on the key id present on the JWT token header.
- n String
- RSA public key modulus.
RsaTokenKeyResponse, RsaTokenKeyResponseArgs        
SystemDataResponse, SystemDataResponseArgs      
- CreatedAt string
- The timestamp of resource creation (UTC).
- CreatedBy string
- The identity that created the resource.
- CreatedBy stringType 
- The type of identity that created the resource.
- LastModified stringAt 
- The timestamp of resource last modification (UTC)
- LastModified stringBy 
- The identity that last modified the resource.
- LastModified stringBy Type 
- The type of identity that last modified the resource.
- CreatedAt string
- The timestamp of resource creation (UTC).
- CreatedBy string
- The identity that created the resource.
- CreatedBy stringType 
- The type of identity that created the resource.
- LastModified stringAt 
- The timestamp of resource last modification (UTC)
- LastModified stringBy 
- The identity that last modified the resource.
- LastModified stringBy Type 
- The type of identity that last modified the resource.
- createdAt String
- The timestamp of resource creation (UTC).
- createdBy String
- The identity that created the resource.
- createdBy StringType 
- The type of identity that created the resource.
- lastModified StringAt 
- The timestamp of resource last modification (UTC)
- lastModified StringBy 
- The identity that last modified the resource.
- lastModified StringBy Type 
- The type of identity that last modified the resource.
- createdAt string
- The timestamp of resource creation (UTC).
- createdBy string
- The identity that created the resource.
- createdBy stringType 
- The type of identity that created the resource.
- lastModified stringAt 
- The timestamp of resource last modification (UTC)
- lastModified stringBy 
- The identity that last modified the resource.
- lastModified stringBy Type 
- The type of identity that last modified the resource.
- created_at str
- The timestamp of resource creation (UTC).
- created_by str
- The identity that created the resource.
- created_by_ strtype 
- The type of identity that created the resource.
- last_modified_ strat 
- The timestamp of resource last modification (UTC)
- last_modified_ strby 
- The identity that last modified the resource.
- last_modified_ strby_ type 
- The type of identity that last modified the resource.
- createdAt String
- The timestamp of resource creation (UTC).
- createdBy String
- The identity that created the resource.
- createdBy StringType 
- The type of identity that created the resource.
- lastModified StringAt 
- The timestamp of resource last modification (UTC)
- lastModified StringBy 
- The identity that last modified the resource.
- lastModified StringBy Type 
- The type of identity that last modified the resource.
TokenClaim, TokenClaimArgs    
TokenClaimResponse, TokenClaimResponseArgs      
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:videoanalyzer:AccessPolicy accessPolicyName1 /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Media/videoAnalyzers/{accountName}/accessPolicies/{accessPolicyName} 
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Native pulumi/pulumi-azure-native
- License
- Apache-2.0