propelauth.RolesAndPermissions
Explore with Pulumi AI
Roles and Permissions resource. This is for configuring the basic roles and permissions information in PropelAuth.
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.propelauth.RolesAndPermissions;
import com.pulumi.propelauth.RolesAndPermissionsArgs;
import com.pulumi.propelauth.inputs.RolesAndPermissionsPermissionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
// Configure what organization roles are available to your users and the permissions associated with them.
var example = new RolesAndPermissions("example", RolesAndPermissionsArgs.builder()
.defaultOwnerRole("Owner")
.defaultRole("Member")
.permissions(
RolesAndPermissionsPermissionArgs.builder()
.description("A description here.")
.displayName("Can read documents.")
.name("doc::read")
.build(),
RolesAndPermissionsPermissionArgs.builder()
.name("doc::write")
.build(),
RolesAndPermissionsPermissionArgs.builder()
.name("ticket::read")
.build(),
RolesAndPermissionsPermissionArgs.builder()
.name("ticket::write")
.build(),
RolesAndPermissionsPermissionArgs.builder()
.name("ai::deploy")
.build())
.roleHierarchies(
"Owner",
"Admin",
"Support",
"Member")
.roles(Map.ofEntries(
Map.entry("Admin", Map.ofEntries(
Map.entry("canChangeRoles", true),
Map.entry("canDeleteOrg", false),
Map.entry("canEditOrgAccess", false),
Map.entry("canInvite", true),
Map.entry("canManageApiKeys", false),
Map.entry("canRemoveUsers", true),
Map.entry("canSetupSaml", false),
Map.entry("canUpdateOrgMetadata", false),
Map.entry("canViewOtherMembers", true),
Map.entry("permissions",
"doc::read",
"doc::write",
"ticket::read")
)),
Map.entry("Member", Map.of("permissions",
"doc::read",
"ticket::read")),
Map.entry("Owner", Map.ofEntries(
Map.entry("canChangeRoles", true),
Map.entry("canDeleteOrg", true),
Map.entry("canEditOrgAccess", true),
Map.entry("canInvite", true),
Map.entry("canManageApiKeys", true),
Map.entry("canRemoveUsers", true),
Map.entry("canSetupSaml", true),
Map.entry("canUpdateOrgMetadata", true),
Map.entry("canViewOtherMembers", true),
Map.entry("permissions",
"doc::read",
"doc::write",
"ticket::read",
"ticket::write")
)),
Map.entry("Support", Map.ofEntries(
Map.entry("canChangeRoles", false),
Map.entry("canDeleteOrg", false),
Map.entry("canEditOrgAccess", false),
Map.entry("canInvite", false),
Map.entry("canManageApiKeys", false),
Map.entry("canRemoveUsers", false),
Map.entry("canSetupSaml", false),
Map.entry("canUpdateOrgMetadata", false),
Map.entry("canViewOtherMembers", true),
Map.entry("isInternal", true),
Map.entry("permissions",
"doc::read",
"ticket::read",
"ai::deploy")
))
))
.build());
}
}
resources:
# Configure what organization roles are available to your users and the permissions associated with them.
example:
type: propelauth:RolesAndPermissions
properties:
defaultOwnerRole: Owner
defaultRole: Member
permissions:
- description: A description here.
displayName: Can read documents.
name: doc::read
- name: doc::write
- name: ticket::read
- name: ticket::write
- name: ai::deploy
roleHierarchies:
- Owner
- Admin
- Support
- Member
roles:
Admin:
- canChangeRoles: true
canDeleteOrg: false
canEditOrgAccess: false
canInvite: true
canManageApiKeys: false
canRemoveUsers: true
canSetupSaml: false
canUpdateOrgMetadata: false
canViewOtherMembers: true
permissions:
- doc::read
- doc::write
- ticket::read
Member:
- permissions:
- doc::read
- ticket::read
Owner:
- canChangeRoles: true
canDeleteOrg: true
canEditOrgAccess: true
canInvite: true
canManageApiKeys: true
canRemoveUsers: true
canSetupSaml: true
canUpdateOrgMetadata: true
canViewOtherMembers: true
permissions:
- doc::read
- doc::write
- ticket::read
- ticket::write
Support:
- canChangeRoles: false
canDeleteOrg: false
canEditOrgAccess: false
canInvite: false
canManageApiKeys: false
canRemoveUsers: false
canSetupSaml: false
canUpdateOrgMetadata: false
canViewOtherMembers: true
isInternal: true
permissions:
- doc::read
- ticket::read
- ai::deploy
Create RolesAndPermissions Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new RolesAndPermissions(name: string, args: RolesAndPermissionsArgs, opts?: CustomResourceOptions);
@overload
def RolesAndPermissions(resource_name: str,
args: RolesAndPermissionsArgs,
opts: Optional[ResourceOptions] = None)
@overload
def RolesAndPermissions(resource_name: str,
opts: Optional[ResourceOptions] = None,
default_owner_role: Optional[str] = None,
default_role: Optional[str] = None,
roles: Optional[Mapping[str, RolesAndPermissionsRolesArgs]] = None,
permissions: Optional[Sequence[RolesAndPermissionsPermissionArgs]] = None,
role_hierarchies: Optional[Sequence[str]] = None)
func NewRolesAndPermissions(ctx *Context, name string, args RolesAndPermissionsArgs, opts ...ResourceOption) (*RolesAndPermissions, error)
public RolesAndPermissions(string name, RolesAndPermissionsArgs args, CustomResourceOptions? opts = null)
public RolesAndPermissions(String name, RolesAndPermissionsArgs args)
public RolesAndPermissions(String name, RolesAndPermissionsArgs args, CustomResourceOptions options)
type: propelauth:RolesAndPermissions
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args RolesAndPermissionsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args RolesAndPermissionsArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args RolesAndPermissionsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args RolesAndPermissionsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args RolesAndPermissionsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var rolesAndPermissionsResource = new Propelauth.RolesAndPermissions("rolesAndPermissionsResource", new()
{
DefaultOwnerRole = "string",
DefaultRole = "string",
Roles =
{
{ "string", new Propelauth.Inputs.RolesAndPermissionsRolesArgs
{
CanChangeRoles = false,
CanDeleteOrg = false,
CanEditOrgAccess = false,
CanInvite = false,
CanManageApiKeys = false,
CanRemoveUsers = false,
CanSetupSaml = false,
CanUpdateOrgMetadata = false,
CanViewOtherMembers = false,
Description = "string",
Disabled = false,
IsInternal = false,
Permissions = new[]
{
"string",
},
ReplacingRole = "string",
RolesCanManages = new[]
{
"string",
},
} },
},
Permissions = new[]
{
new Propelauth.Inputs.RolesAndPermissionsPermissionArgs
{
Name = "string",
Description = "string",
DisplayName = "string",
},
},
RoleHierarchies = new[]
{
"string",
},
});
example, err := propelauth.NewRolesAndPermissions(ctx, "rolesAndPermissionsResource", &propelauth.RolesAndPermissionsArgs{
DefaultOwnerRole: pulumi.String("string"),
DefaultRole: pulumi.String("string"),
Roles: .RolesAndPermissionsRolesMap{
"string": &.RolesAndPermissionsRolesArgs{
CanChangeRoles: pulumi.Bool(false),
CanDeleteOrg: pulumi.Bool(false),
CanEditOrgAccess: pulumi.Bool(false),
CanInvite: pulumi.Bool(false),
CanManageApiKeys: pulumi.Bool(false),
CanRemoveUsers: pulumi.Bool(false),
CanSetupSaml: pulumi.Bool(false),
CanUpdateOrgMetadata: pulumi.Bool(false),
CanViewOtherMembers: pulumi.Bool(false),
Description: pulumi.String("string"),
Disabled: pulumi.Bool(false),
IsInternal: pulumi.Bool(false),
Permissions: pulumi.StringArray{
pulumi.String("string"),
},
ReplacingRole: pulumi.String("string"),
RolesCanManages: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Permissions: .RolesAndPermissionsPermissionArray{
&.RolesAndPermissionsPermissionArgs{
Name: pulumi.String("string"),
Description: pulumi.String("string"),
DisplayName: pulumi.String("string"),
},
},
RoleHierarchies: pulumi.StringArray{
pulumi.String("string"),
},
})
var rolesAndPermissionsResource = new RolesAndPermissions("rolesAndPermissionsResource", RolesAndPermissionsArgs.builder()
.defaultOwnerRole("string")
.defaultRole("string")
.roles(Map.of("string", Map.ofEntries(
Map.entry("canChangeRoles", false),
Map.entry("canDeleteOrg", false),
Map.entry("canEditOrgAccess", false),
Map.entry("canInvite", false),
Map.entry("canManageApiKeys", false),
Map.entry("canRemoveUsers", false),
Map.entry("canSetupSaml", false),
Map.entry("canUpdateOrgMetadata", false),
Map.entry("canViewOtherMembers", false),
Map.entry("description", "string"),
Map.entry("disabled", false),
Map.entry("isInternal", false),
Map.entry("permissions", "string"),
Map.entry("replacingRole", "string"),
Map.entry("rolesCanManages", "string")
)))
.permissions(RolesAndPermissionsPermissionArgs.builder()
.name("string")
.description("string")
.displayName("string")
.build())
.roleHierarchies("string")
.build());
roles_and_permissions_resource = propelauth.RolesAndPermissions("rolesAndPermissionsResource",
default_owner_role="string",
default_role="string",
roles={
"string": {
"can_change_roles": False,
"can_delete_org": False,
"can_edit_org_access": False,
"can_invite": False,
"can_manage_api_keys": False,
"can_remove_users": False,
"can_setup_saml": False,
"can_update_org_metadata": False,
"can_view_other_members": False,
"description": "string",
"disabled": False,
"is_internal": False,
"permissions": ["string"],
"replacing_role": "string",
"roles_can_manages": ["string"],
},
},
permissions=[{
"name": "string",
"description": "string",
"display_name": "string",
}],
role_hierarchies=["string"])
const rolesAndPermissionsResource = new propelauth.RolesAndPermissions("rolesAndPermissionsResource", {
defaultOwnerRole: "string",
defaultRole: "string",
roles: {
string: {
canChangeRoles: false,
canDeleteOrg: false,
canEditOrgAccess: false,
canInvite: false,
canManageApiKeys: false,
canRemoveUsers: false,
canSetupSaml: false,
canUpdateOrgMetadata: false,
canViewOtherMembers: false,
description: "string",
disabled: false,
isInternal: false,
permissions: ["string"],
replacingRole: "string",
rolesCanManages: ["string"],
},
},
permissions: [{
name: "string",
description: "string",
displayName: "string",
}],
roleHierarchies: ["string"],
});
type: propelauth:RolesAndPermissions
properties:
defaultOwnerRole: string
defaultRole: string
permissions:
- description: string
displayName: string
name: string
roleHierarchies:
- string
roles:
string:
canChangeRoles: false
canDeleteOrg: false
canEditOrgAccess: false
canInvite: false
canManageApiKeys: false
canRemoveUsers: false
canSetupSaml: false
canUpdateOrgMetadata: false
canViewOtherMembers: false
description: string
disabled: false
isInternal: false
permissions:
- string
replacingRole: string
rolesCanManages:
- string
RolesAndPermissions Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The RolesAndPermissions resource accepts the following input properties:
- Default
Owner stringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - Default
Role string - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - Roles
Dictionary<string, Roles
And Permissions Roles Args> - Permissions
List<Roles
And Permissions Permission> - A list of permissions that are specific to your application and can be assigned to individual roles.
- Role
Hierarchies List<string> - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition.
- Default
Owner stringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - Default
Role string - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - Roles
map[string]Roles
And Permissions Roles Args - Permissions
[]Roles
And Permissions Permission Args - A list of permissions that are specific to your application and can be assigned to individual roles.
- Role
Hierarchies []string - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition.
- default
Owner StringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default
Role String - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - roles
Map<String,Roles
And Permissions Roles Args> - permissions
List<Roles
And Permissions Permission> - A list of permissions that are specific to your application and can be assigned to individual roles.
- role
Hierarchies List<String> - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition.
- default
Owner stringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default
Role string - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - roles
{[key: string]: Roles
And Permissions Roles Args} - permissions
Roles
And Permissions Permission[] - A list of permissions that are specific to your application and can be assigned to individual roles.
- role
Hierarchies string[] - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition.
- default_
owner_ strrole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default_
role str - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - roles
Mapping[str, Roles
And Permissions Roles Args] - permissions
Sequence[Roles
And Permissions Permission Args] - A list of permissions that are specific to your application and can be assigned to individual roles.
- role_
hierarchies Sequence[str] - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition.
- default
Owner StringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default
Role String - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - roles Map<Property Map>
- permissions List<Property Map>
- A list of permissions that are specific to your application and can be assigned to individual roles.
- role
Hierarchies List<String> - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition.
Outputs
All input properties are implicitly available as output properties. Additionally, the RolesAndPermissions resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Multiple
Roles boolPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard.
- Id string
- The provider-assigned unique ID for this managed resource.
- Multiple
Roles boolPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard.
- id String
- The provider-assigned unique ID for this managed resource.
- multiple
Roles BooleanPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard.
- id string
- The provider-assigned unique ID for this managed resource.
- multiple
Roles booleanPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard.
- id str
- The provider-assigned unique ID for this managed resource.
- multiple_
roles_ boolper_ user - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard.
- id String
- The provider-assigned unique ID for this managed resource.
- multiple
Roles BooleanPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard.
Look up Existing RolesAndPermissions Resource
Get an existing RolesAndPermissions resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: RolesAndPermissionsState, opts?: CustomResourceOptions): RolesAndPermissions
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
default_owner_role: Optional[str] = None,
default_role: Optional[str] = None,
multiple_roles_per_user: Optional[bool] = None,
permissions: Optional[Sequence[RolesAndPermissionsPermissionArgs]] = None,
role_hierarchies: Optional[Sequence[str]] = None,
roles: Optional[Mapping[str, RolesAndPermissionsRolesArgs]] = None) -> RolesAndPermissions
func GetRolesAndPermissions(ctx *Context, name string, id IDInput, state *RolesAndPermissionsState, opts ...ResourceOption) (*RolesAndPermissions, error)
public static RolesAndPermissions Get(string name, Input<string> id, RolesAndPermissionsState? state, CustomResourceOptions? opts = null)
public static RolesAndPermissions get(String name, Output<String> id, RolesAndPermissionsState state, CustomResourceOptions options)
resources: _: type: propelauth:RolesAndPermissions get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Default
Owner stringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - Default
Role string - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - Multiple
Roles boolPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard. - Permissions
List<Roles
And Permissions Permission> - A list of permissions that are specific to your application and can be assigned to individual roles.
- Role
Hierarchies List<string> - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition. - Roles
Dictionary<string, Roles
And Permissions Roles Args>
- Default
Owner stringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - Default
Role string - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - Multiple
Roles boolPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard. - Permissions
[]Roles
And Permissions Permission Args - A list of permissions that are specific to your application and can be assigned to individual roles.
- Role
Hierarchies []string - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition. - Roles
map[string]Roles
And Permissions Roles Args
- default
Owner StringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default
Role String - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - multiple
Roles BooleanPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard. - permissions
List<Roles
And Permissions Permission> - A list of permissions that are specific to your application and can be assigned to individual roles.
- role
Hierarchies List<String> - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition. - roles
Map<String,Roles
And Permissions Roles Args>
- default
Owner stringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default
Role string - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - multiple
Roles booleanPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard. - permissions
Roles
And Permissions Permission[] - A list of permissions that are specific to your application and can be assigned to individual roles.
- role
Hierarchies string[] - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition. - roles
{[key: string]: Roles
And Permissions Roles Args}
- default_
owner_ strrole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default_
role str - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - multiple_
roles_ boolper_ user - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard. - permissions
Sequence[Roles
And Permissions Permission Args] - A list of permissions that are specific to your application and can be assigned to individual roles.
- role_
hierarchies Sequence[str] - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition. - roles
Mapping[str, Roles
And Permissions Roles Args]
- default
Owner StringRole - The
default_owner_role
is the role automatically assigned to the user who creates the organization. - default
Role String - The
default_role
is the role assigned to a user if they join an organization and no other role is assigned to them. It is also the fallback role in the instance their role is deleted from the configuration without a replacement. - multiple
Roles BooleanPer User - If true, than each member of an organization can have multiple roles and their is no hierarchy between roles. Instead, the relationship between roles is defined by the
roles_can_manage
field on each individual role definition. A single-role project can be migrated to multi-role, but not the other way around. Because of this, this can only be set in the PropelAuth dashboard. - permissions List<Property Map>
- A list of permissions that are specific to your application and can be assigned to individual roles.
- role
Hierarchies List<String> - A list of roles in order of hierarchy. The first role in the list is the highest role and the last role is the lowest role. This is only relevant if
multiple_roles_per_user
is false. Ifmultiple_roles_per_user
is true, the roles that a role can manage is defined by theroles_can_manage
field on each individual role definition. - roles Map<Property Map>
Supporting Types
RolesAndPermissionsPermission, RolesAndPermissionsPermissionArgs
- Name string
- The name of the permission. This should be a unique identifier for the permission.
- Description string
- A description of the permission. This is a human readable description of what the permission allows.
- Display
Name string - The display name of the permission. This is the human readable name of the permission. If not provided, the
name
will be used.
- Name string
- The name of the permission. This should be a unique identifier for the permission.
- Description string
- A description of the permission. This is a human readable description of what the permission allows.
- Display
Name string - The display name of the permission. This is the human readable name of the permission. If not provided, the
name
will be used.
- name String
- The name of the permission. This should be a unique identifier for the permission.
- description String
- A description of the permission. This is a human readable description of what the permission allows.
- display
Name String - The display name of the permission. This is the human readable name of the permission. If not provided, the
name
will be used.
- name string
- The name of the permission. This should be a unique identifier for the permission.
- description string
- A description of the permission. This is a human readable description of what the permission allows.
- display
Name string - The display name of the permission. This is the human readable name of the permission. If not provided, the
name
will be used.
- name str
- The name of the permission. This should be a unique identifier for the permission.
- description str
- A description of the permission. This is a human readable description of what the permission allows.
- display_
name str - The display name of the permission. This is the human readable name of the permission. If not provided, the
name
will be used.
- name String
- The name of the permission. This should be a unique identifier for the permission.
- description String
- A description of the permission. This is a human readable description of what the permission allows.
- display
Name String - The display name of the permission. This is the human readable name of the permission. If not provided, the
name
will be used.
RolesAndPermissionsRoles, RolesAndPermissionsRolesArgs
- Can
Change boolRoles - If true, users with this role in the org can change the roles of other users in the organization. The default is false.
- Can
Delete boolOrg - If true, users with this role in the org can delete the organization. The default is false.
- Can
Edit boolOrg Access - If true, users with this role in the org can edit the organization's access settings. These settings incluede what email domains are included and whether 2FA is enforced for the org. The default is false.
- Can
Invite bool - If true, users with this role in the org can invite other users to the organization. The default is false.
- Can
Manage boolApi Keys - If true, users with this role in the org can manage API keys for the organization. The default is false.
- Can
Remove boolUsers - If true, users with this role in the org can remove other users from the organization. The default is false.
- Can
Setup boolSaml - If true, users with this role in the org can setup enterprise SSO for the organization. The default is false.
- Can
Update boolOrg Metadata - If true, users with this role in the org can update the organization's metadata. This includes changing the name of the organization. The default is false.
- Can
View boolOther Members - If true, users with this role in the org can view other members of the organization. The default is true.
- Description string
- A human-readable description of the role.
- Disabled bool
- If true, this role is disabled and cannot be assigned to users. It is only useful if you intend to use the role in non-default role mappings exclusively. The default is false.
- Is
Internal bool - If true, this role is an internal role and cannot be assigned to or viewed by end users. The default is false.
- Permissions List<string>
- A list of permissions specific to your application that are assigned to this role.
- Replacing
Role string - The name of a role that no longer exists but this role is replacing. This should only be used if you are attempting to change the name of an existing role and want to ensure that users who had the old role now have this role. The
replacing_role
should not exist in theroles
map. - Roles
Can List<string>Manages - A list of roles that this role can manage. This is only relevant if
multiple_roles_per_user
is true. Ifmultiple_roles_per_user
is false, the other roles that a role can manage is defined by the order inrole_hierarchy
where the first role is able to manage every other role including itself.
- Can
Change boolRoles - If true, users with this role in the org can change the roles of other users in the organization. The default is false.
- Can
Delete boolOrg - If true, users with this role in the org can delete the organization. The default is false.
- Can
Edit boolOrg Access - If true, users with this role in the org can edit the organization's access settings. These settings incluede what email domains are included and whether 2FA is enforced for the org. The default is false.
- Can
Invite bool - If true, users with this role in the org can invite other users to the organization. The default is false.
- Can
Manage boolApi Keys - If true, users with this role in the org can manage API keys for the organization. The default is false.
- Can
Remove boolUsers - If true, users with this role in the org can remove other users from the organization. The default is false.
- Can
Setup boolSaml - If true, users with this role in the org can setup enterprise SSO for the organization. The default is false.
- Can
Update boolOrg Metadata - If true, users with this role in the org can update the organization's metadata. This includes changing the name of the organization. The default is false.
- Can
View boolOther Members - If true, users with this role in the org can view other members of the organization. The default is true.
- Description string
- A human-readable description of the role.
- Disabled bool
- If true, this role is disabled and cannot be assigned to users. It is only useful if you intend to use the role in non-default role mappings exclusively. The default is false.
- Is
Internal bool - If true, this role is an internal role and cannot be assigned to or viewed by end users. The default is false.
- Permissions []string
- A list of permissions specific to your application that are assigned to this role.
- Replacing
Role string - The name of a role that no longer exists but this role is replacing. This should only be used if you are attempting to change the name of an existing role and want to ensure that users who had the old role now have this role. The
replacing_role
should not exist in theroles
map. - Roles
Can []stringManages - A list of roles that this role can manage. This is only relevant if
multiple_roles_per_user
is true. Ifmultiple_roles_per_user
is false, the other roles that a role can manage is defined by the order inrole_hierarchy
where the first role is able to manage every other role including itself.
- can
Change BooleanRoles - If true, users with this role in the org can change the roles of other users in the organization. The default is false.
- can
Delete BooleanOrg - If true, users with this role in the org can delete the organization. The default is false.
- can
Edit BooleanOrg Access - If true, users with this role in the org can edit the organization's access settings. These settings incluede what email domains are included and whether 2FA is enforced for the org. The default is false.
- can
Invite Boolean - If true, users with this role in the org can invite other users to the organization. The default is false.
- can
Manage BooleanApi Keys - If true, users with this role in the org can manage API keys for the organization. The default is false.
- can
Remove BooleanUsers - If true, users with this role in the org can remove other users from the organization. The default is false.
- can
Setup BooleanSaml - If true, users with this role in the org can setup enterprise SSO for the organization. The default is false.
- can
Update BooleanOrg Metadata - If true, users with this role in the org can update the organization's metadata. This includes changing the name of the organization. The default is false.
- can
View BooleanOther Members - If true, users with this role in the org can view other members of the organization. The default is true.
- description String
- A human-readable description of the role.
- disabled Boolean
- If true, this role is disabled and cannot be assigned to users. It is only useful if you intend to use the role in non-default role mappings exclusively. The default is false.
- is
Internal Boolean - If true, this role is an internal role and cannot be assigned to or viewed by end users. The default is false.
- permissions List<String>
- A list of permissions specific to your application that are assigned to this role.
- replacing
Role String - The name of a role that no longer exists but this role is replacing. This should only be used if you are attempting to change the name of an existing role and want to ensure that users who had the old role now have this role. The
replacing_role
should not exist in theroles
map. - roles
Can List<String>Manages - A list of roles that this role can manage. This is only relevant if
multiple_roles_per_user
is true. Ifmultiple_roles_per_user
is false, the other roles that a role can manage is defined by the order inrole_hierarchy
where the first role is able to manage every other role including itself.
- can
Change booleanRoles - If true, users with this role in the org can change the roles of other users in the organization. The default is false.
- can
Delete booleanOrg - If true, users with this role in the org can delete the organization. The default is false.
- can
Edit booleanOrg Access - If true, users with this role in the org can edit the organization's access settings. These settings incluede what email domains are included and whether 2FA is enforced for the org. The default is false.
- can
Invite boolean - If true, users with this role in the org can invite other users to the organization. The default is false.
- can
Manage booleanApi Keys - If true, users with this role in the org can manage API keys for the organization. The default is false.
- can
Remove booleanUsers - If true, users with this role in the org can remove other users from the organization. The default is false.
- can
Setup booleanSaml - If true, users with this role in the org can setup enterprise SSO for the organization. The default is false.
- can
Update booleanOrg Metadata - If true, users with this role in the org can update the organization's metadata. This includes changing the name of the organization. The default is false.
- can
View booleanOther Members - If true, users with this role in the org can view other members of the organization. The default is true.
- description string
- A human-readable description of the role.
- disabled boolean
- If true, this role is disabled and cannot be assigned to users. It is only useful if you intend to use the role in non-default role mappings exclusively. The default is false.
- is
Internal boolean - If true, this role is an internal role and cannot be assigned to or viewed by end users. The default is false.
- permissions string[]
- A list of permissions specific to your application that are assigned to this role.
- replacing
Role string - The name of a role that no longer exists but this role is replacing. This should only be used if you are attempting to change the name of an existing role and want to ensure that users who had the old role now have this role. The
replacing_role
should not exist in theroles
map. - roles
Can string[]Manages - A list of roles that this role can manage. This is only relevant if
multiple_roles_per_user
is true. Ifmultiple_roles_per_user
is false, the other roles that a role can manage is defined by the order inrole_hierarchy
where the first role is able to manage every other role including itself.
- can_
change_ boolroles - If true, users with this role in the org can change the roles of other users in the organization. The default is false.
- can_
delete_ boolorg - If true, users with this role in the org can delete the organization. The default is false.
- can_
edit_ boolorg_ access - If true, users with this role in the org can edit the organization's access settings. These settings incluede what email domains are included and whether 2FA is enforced for the org. The default is false.
- can_
invite bool - If true, users with this role in the org can invite other users to the organization. The default is false.
- can_
manage_ boolapi_ keys - If true, users with this role in the org can manage API keys for the organization. The default is false.
- can_
remove_ boolusers - If true, users with this role in the org can remove other users from the organization. The default is false.
- can_
setup_ boolsaml - If true, users with this role in the org can setup enterprise SSO for the organization. The default is false.
- can_
update_ boolorg_ metadata - If true, users with this role in the org can update the organization's metadata. This includes changing the name of the organization. The default is false.
- can_
view_ boolother_ members - If true, users with this role in the org can view other members of the organization. The default is true.
- description str
- A human-readable description of the role.
- disabled bool
- If true, this role is disabled and cannot be assigned to users. It is only useful if you intend to use the role in non-default role mappings exclusively. The default is false.
- is_
internal bool - If true, this role is an internal role and cannot be assigned to or viewed by end users. The default is false.
- permissions Sequence[str]
- A list of permissions specific to your application that are assigned to this role.
- replacing_
role str - The name of a role that no longer exists but this role is replacing. This should only be used if you are attempting to change the name of an existing role and want to ensure that users who had the old role now have this role. The
replacing_role
should not exist in theroles
map. - roles_
can_ Sequence[str]manages - A list of roles that this role can manage. This is only relevant if
multiple_roles_per_user
is true. Ifmultiple_roles_per_user
is false, the other roles that a role can manage is defined by the order inrole_hierarchy
where the first role is able to manage every other role including itself.
- can
Change BooleanRoles - If true, users with this role in the org can change the roles of other users in the organization. The default is false.
- can
Delete BooleanOrg - If true, users with this role in the org can delete the organization. The default is false.
- can
Edit BooleanOrg Access - If true, users with this role in the org can edit the organization's access settings. These settings incluede what email domains are included and whether 2FA is enforced for the org. The default is false.
- can
Invite Boolean - If true, users with this role in the org can invite other users to the organization. The default is false.
- can
Manage BooleanApi Keys - If true, users with this role in the org can manage API keys for the organization. The default is false.
- can
Remove BooleanUsers - If true, users with this role in the org can remove other users from the organization. The default is false.
- can
Setup BooleanSaml - If true, users with this role in the org can setup enterprise SSO for the organization. The default is false.
- can
Update BooleanOrg Metadata - If true, users with this role in the org can update the organization's metadata. This includes changing the name of the organization. The default is false.
- can
View BooleanOther Members - If true, users with this role in the org can view other members of the organization. The default is true.
- description String
- A human-readable description of the role.
- disabled Boolean
- If true, this role is disabled and cannot be assigned to users. It is only useful if you intend to use the role in non-default role mappings exclusively. The default is false.
- is
Internal Boolean - If true, this role is an internal role and cannot be assigned to or viewed by end users. The default is false.
- permissions List<String>
- A list of permissions specific to your application that are assigned to this role.
- replacing
Role String - The name of a role that no longer exists but this role is replacing. This should only be used if you are attempting to change the name of an existing role and want to ensure that users who had the old role now have this role. The
replacing_role
should not exist in theroles
map. - roles
Can List<String>Manages - A list of roles that this role can manage. This is only relevant if
multiple_roles_per_user
is true. Ifmultiple_roles_per_user
is false, the other roles that a role can manage is defined by the order inrole_hierarchy
where the first role is able to manage every other role including itself.
Import
As there is only one default roles_and_permissions per project there’s no need to specify the id,
$ pulumi import propelauth:index/rolesAndPermissions:RolesAndPermissions but requires an id to be specified, so we can use an arbitrary string here.
$ pulumi import propelauth:index/rolesAndPermissions:RolesAndPermissions example arbitrary_string_here
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- propelauth propelauth/terraform-provider-propelauth
- License
- Notes
- This Pulumi package is based on the
propelauth
Terraform Provider.