CredentialProviderV2DTO
Possible values: [aembit-access-token
, apikey
, aws-sts-oidc
, azure-entra-federation
, gcp-identity-federation
, gitlab-managed-account
, oauth-authorization-code
, oauth-client-credential
, signed-jwt
, username-password
, vaultClientToken
]
- aembit-access-token
- apikey
- aws-sts-oidc
- azure-entra-federation
- gcp-identity-federation
- gitlab-managed-account
- oauth-authorization-code
- oauth-client-credential
- signed-jwt
- username-password
- vaultClientToken
Audience for the access token
Possible values: non-empty
Aembit Role Id
Access token lifetime (in seconds)
API Key
Possible values: non-empty
Amazon Resource Name(ARN) for AWS IAM Role
Possible values: non-empty
Access token lifetime (in seconds)
Audience for the access token
Possible values: non-empty
Subject for the access token
Possible values: non-empty
Scope for the access token
Possible values: non-empty
Azure tenant ID
Possible values: non-empty
Azure client ID
Possible values: non-empty
Audience for the access token
Possible values: non-empty
Service account email
Possible values: non-empty
Access token lifetime (in seconds)
Comma separated list of GitLab Group Identifiers or Paths
Comma separated list of GitLab Project Identifiers or Paths
Access level code to use while assigning Managed Service Account to a group or a project
Lifetime (in seconds) of a Personal Access Token of the Managed Service Account
A space separated list of scopes to be specified when requesting a Personal Access Token of a Managed Service Account
Possible values: non-empty
GitLab user ID of the Managed Service Account.
GitLab username of the Managed Service Account.
Expiration timestamp of the Personal Access Token of the Managed Service Account.
Timestamp of the latest operation performed with the Personal Access Token of the Managed Service Account.
Status of the Personal Access Token of the Managed Service Account.
Contains an error message related to the last unsuccessful operation using the Personal Access Token of the Managed Service Account.
ID of the Credential Provider Integration with which this Managed GitLab Account Credential Provider is associated
OAuth Client ID
Possible values: non-empty
OAuth Client Secret
OAuth Scopes
customParameters object[]nullable
Custom Claims that are added to the Access Token
OAuth well-known metadata endpoint
Possible values: non-empty
OAuth Authorization URL for handling authorization requests
Possible values: non-empty
OAuth Token URL for handling token requests
Possible values: non-empty
Indicates if Proof Key for Code Exchange (PKCE) protocol flow must be used
The callback URL where the Authorization Server sends the Authorization Code
Authorization URL to be used for authorization of the Credential Provider by a privileged user
State parameter to maintain state between the authorization request and callback
OAuth Client ID
Possible values: non-empty
OAuth Client Secret
OAuth Scopes
customParameters object[]nullable
Custom Claims that are added to the Access Token
OAuth Token URL for handling token requests
Possible values: non-empty
Defines how credential would be transmitted. Accepted value: 'postBody', 'authHeader'
Token configuration type. Accepted value: 'snowflake'
Possible values: non-empty
Access token lifetime (in seconds)
Token signing algorithm. Accepted value: 'RS256'
Possible values: non-empty
Issuer of the access token
Possible values: non-empty
Subject of the access token
Possible values: non-empty
Username
Possible values: non-empty
Password. Set to null on updates if not wish to change it
Possible values: non-empty
Issuer of the Access Token
Possible values: non-empty
Subject of the Access Token
Possible values: non-empty
Subject type, Accepted values: 'literal', 'dynamic'
Access Token(used for authentication against vault OIDC provider) Lifetime in seconds
customClaimNames object[]nullable
Custom Claims that are added to the Access Token
Vault host
Possible values: non-empty
Tls enabled/disabled when connecting to the vault instance
Port number for connecting to the vault instance
Possible values: >= 1
and <= 65535
Vault authentication path
Possible values: non-empty
Namespace to be used when connecting to the vault instance
User role to be used when connecting to the vault instance
Forwarding configuration for the vault request. Accepted values: '', 'conditional', 'unconditional'
Specifies whether the Vault instance is accessible over a private network
Name of the Entity
Possible values: non-empty
and <= 128 characters
Description of the Entity
True/False value that determines if this entity is Active or Disabled
tags object[]nullable
Tag Key
Possible values: non-empty
Tag Key Value
Possible values: non-empty
ID of the Resource Set in which this Access Entity exists
Access Policies associated with this Credential Provider
{
"type": "string",
"externalId": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"name": "string",
"description": "string",
"isActive": true,
"tags": [
{
"key": "string",
"value": "string"
}
],
"createdAt": "2024-07-29T15:51:28.071Z",
"modifiedAt": "2024-07-29T15:51:28.071Z",
"createdBy": "string",
"modifiedBy": "string",
"resourceSet": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"lifetimeTimeSpanSeconds": 0,
"lifetimeExpiration": "2024-07-29T15:51:28.071Z",
"accessPolicyCount": 0
}