zia.AdminUsers
Explore with Pulumi AI
The zia_admin_users resource allows the creation and management of ZIA admin user account created in the Zscaler Internet Access cloud or via the API.
Example Usage
Organization Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "ORGANIZATION",
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="ORGANIZATION")
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("ORGANIZATION"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "ORGANIZATION",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("ORGANIZATION")
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: ORGANIZATION
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
Department Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
const engineering = zia.getDepartmentManagement({
name: "Engineering",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "DEPARTMENT",
adminScopeEntities: {
ids: [
engineering.then(engineering => engineering.id),
data.zia_department_management.sales.id,
],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
engineering = zia.get_department_management(name="Engineering")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="DEPARTMENT",
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[
engineering.id,
data["zia_department_management"]["sales"]["id"],
],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
engineering, err := zia.GetDepartmentManagement(ctx, &zia.GetDepartmentManagementArgs{
Name: pulumi.StringRef("Engineering"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("DEPARTMENT"),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(engineering.Id),
data.Zia_department_management.Sales.Id,
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
var engineering = Zia.GetDepartmentManagement.Invoke(new()
{
Name = "Engineering",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "DEPARTMENT",
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
engineering.Apply(getDepartmentManagementResult => getDepartmentManagementResult.Id),
data.Zia_department_management.Sales.Id,
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetDepartmentManagementArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
final var engineering = ZiaFunctions.getDepartmentManagement(GetDepartmentManagementArgs.builder()
.name("Engineering")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("DEPARTMENT")
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(
engineering.applyValue(getDepartmentManagementResult -> getDepartmentManagementResult.id()),
data.zia_department_management().sales().id())
.build())
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: DEPARTMENT
adminScopeEntities:
ids:
- ${engineering.id}
- ${data.zia_department_management.sales.id}
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
engineering:
fn::invoke:
Function: zia:getDepartmentManagement
Arguments:
name: Engineering
Location Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
const auSydneyBranch01 = zia.getLocationManagement({
name: "AU - Sydney - Branch01",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "LOCATION",
adminScopeEntities: {
ids: [auSydneyBranch01.then(auSydneyBranch01 => auSydneyBranch01.id)],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
au_sydney_branch01 = zia.get_location_management(name="AU - Sydney - Branch01")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="LOCATION",
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[au_sydney_branch01.id],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
auSydneyBranch01, err := zia.LookupLocationManagement(ctx, &zia.LookupLocationManagementArgs{
Name: pulumi.StringRef("AU - Sydney - Branch01"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("LOCATION"),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(auSydneyBranch01.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
var auSydneyBranch01 = Zia.GetLocationManagement.Invoke(new()
{
Name = "AU - Sydney - Branch01",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "LOCATION",
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
auSydneyBranch01.Apply(getLocationManagementResult => getLocationManagementResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetLocationManagementArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
final var auSydneyBranch01 = ZiaFunctions.getLocationManagement(GetLocationManagementArgs.builder()
.name("AU - Sydney - Branch01")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("LOCATION")
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(auSydneyBranch01.applyValue(getLocationManagementResult -> getLocationManagementResult.id()))
.build())
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: LOCATION
adminScopeEntities:
ids:
- ${auSydneyBranch01.id}
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
auSydneyBranch01:
fn::invoke:
Function: zia:getLocationManagement
Arguments:
name: AU - Sydney - Branch01
Location Group Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
const corporateUserTrafficGroup = zia.getLocationGroups({
name: "Corporate User Traffic Group",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "LOCATION_GROUP",
adminScopeEntities: {
ids: [corporateUserTrafficGroup.then(corporateUserTrafficGroup => corporateUserTrafficGroup.id)],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
corporate_user_traffic_group = zia.get_location_groups(name="Corporate User Traffic Group")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="LOCATION_GROUP",
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[corporate_user_traffic_group.id],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
corporateUserTrafficGroup, err := zia.GetLocationGroups(ctx, &zia.GetLocationGroupsArgs{
Name: pulumi.StringRef("Corporate User Traffic Group"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("LOCATION_GROUP"),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(corporateUserTrafficGroup.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
var corporateUserTrafficGroup = Zia.GetLocationGroups.Invoke(new()
{
Name = "Corporate User Traffic Group",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "LOCATION_GROUP",
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
corporateUserTrafficGroup.Apply(getLocationGroupsResult => getLocationGroupsResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetLocationGroupsArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
final var corporateUserTrafficGroup = ZiaFunctions.getLocationGroups(GetLocationGroupsArgs.builder()
.name("Corporate User Traffic Group")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("LOCATION_GROUP")
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(corporateUserTrafficGroup.applyValue(getLocationGroupsResult -> getLocationGroupsResult.id()))
.build())
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: LOCATION_GROUP
adminScopeEntities:
ids:
- ${corporateUserTrafficGroup.id}
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
corporateUserTrafficGroup:
fn::invoke:
Function: zia:getLocationGroups
Arguments:
name: Corporate User Traffic Group
Create AdminUsers Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AdminUsers(name: string, args: AdminUsersArgs, opts?: CustomResourceOptions);
@overload
def AdminUsers(resource_name: str,
args: AdminUsersArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AdminUsers(resource_name: str,
opts: Optional[ResourceOptions] = None,
email: Optional[str] = None,
username: Optional[str] = None,
login_name: Optional[str] = None,
is_password_expired: Optional[bool] = None,
is_product_update_comm_enabled: Optional[bool] = None,
is_auditor: Optional[bool] = None,
is_exec_mobile_app_enabled: Optional[bool] = None,
is_non_editable: Optional[bool] = None,
admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
is_password_login_allowed: Optional[bool] = None,
disabled: Optional[bool] = None,
is_security_report_comm_enabled: Optional[bool] = None,
is_service_update_comm_enabled: Optional[bool] = None,
comments: Optional[str] = None,
password: Optional[str] = None,
roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
admin_scope_type: Optional[str] = None)
func NewAdminUsers(ctx *Context, name string, args AdminUsersArgs, opts ...ResourceOption) (*AdminUsers, error)
public AdminUsers(string name, AdminUsersArgs args, CustomResourceOptions? opts = null)
public AdminUsers(String name, AdminUsersArgs args)
public AdminUsers(String name, AdminUsersArgs args, CustomResourceOptions options)
type: zia:AdminUsers
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var adminUsersResource = new Zia.AdminUsers("adminUsersResource", new()
{
Email = "string",
Username = "string",
LoginName = "string",
IsPasswordExpired = false,
IsProductUpdateCommEnabled = false,
IsAuditor = false,
IsExecMobileAppEnabled = false,
IsNonEditable = false,
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
0,
},
},
IsPasswordLoginAllowed = false,
Disabled = false,
IsSecurityReportCommEnabled = false,
IsServiceUpdateCommEnabled = false,
Comments = "string",
Password = "string",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = 0,
},
},
AdminScopeType = "string",
});
example, err := zia.NewAdminUsers(ctx, "adminUsersResource", &zia.AdminUsersArgs{
Email: pulumi.String("string"),
Username: pulumi.String("string"),
LoginName: pulumi.String("string"),
IsPasswordExpired: pulumi.Bool(false),
IsProductUpdateCommEnabled: pulumi.Bool(false),
IsAuditor: pulumi.Bool(false),
IsExecMobileAppEnabled: pulumi.Bool(false),
IsNonEditable: pulumi.Bool(false),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
IsPasswordLoginAllowed: pulumi.Bool(false),
Disabled: pulumi.Bool(false),
IsSecurityReportCommEnabled: pulumi.Bool(false),
IsServiceUpdateCommEnabled: pulumi.Bool(false),
Comments: pulumi.String("string"),
Password: pulumi.String("string"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(0),
},
},
AdminScopeType: pulumi.String("string"),
})
var adminUsersResource = new AdminUsers("adminUsersResource", AdminUsersArgs.builder()
.email("string")
.username("string")
.loginName("string")
.isPasswordExpired(false)
.isProductUpdateCommEnabled(false)
.isAuditor(false)
.isExecMobileAppEnabled(false)
.isNonEditable(false)
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(0)
.build())
.isPasswordLoginAllowed(false)
.disabled(false)
.isSecurityReportCommEnabled(false)
.isServiceUpdateCommEnabled(false)
.comments("string")
.password("string")
.roles(AdminUsersRoleArgs.builder()
.id(0)
.build())
.adminScopeType("string")
.build());
admin_users_resource = zia.AdminUsers("adminUsersResource",
email="string",
username="string",
login_name="string",
is_password_expired=False,
is_product_update_comm_enabled=False,
is_auditor=False,
is_exec_mobile_app_enabled=False,
is_non_editable=False,
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[0],
),
is_password_login_allowed=False,
disabled=False,
is_security_report_comm_enabled=False,
is_service_update_comm_enabled=False,
comments="string",
password="string",
roles=[zia.AdminUsersRoleArgs(
id=0,
)],
admin_scope_type="string")
const adminUsersResource = new zia.AdminUsers("adminUsersResource", {
email: "string",
username: "string",
loginName: "string",
isPasswordExpired: false,
isProductUpdateCommEnabled: false,
isAuditor: false,
isExecMobileAppEnabled: false,
isNonEditable: false,
adminScopeEntities: {
ids: [0],
},
isPasswordLoginAllowed: false,
disabled: false,
isSecurityReportCommEnabled: false,
isServiceUpdateCommEnabled: false,
comments: "string",
password: "string",
roles: [{
id: 0,
}],
adminScopeType: "string",
});
type: zia:AdminUsers
properties:
adminScopeEntities:
ids:
- 0
adminScopeType: string
comments: string
disabled: false
email: string
isAuditor: false
isExecMobileAppEnabled: false
isNonEditable: false
isPasswordExpired: false
isPasswordLoginAllowed: false
isProductUpdateCommEnabled: false
isSecurityReportCommEnabled: false
isServiceUpdateCommEnabled: false
loginName: string
password: string
roles:
- id: 0
username: string
AdminUsers Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The AdminUsers resource accepts the following input properties:
- Email string
- Admin or auditor's email address.
- Login
Name string - The email address of the admin user to be exported.
- Username string
- The username of the admin user to be exported.
- Admin
Scope zscaler.Entities Pulumi Package. Zia. Inputs. Admin Users Admin Scope Entities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- Admin
Scope stringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- Is
Auditor bool - Indicates whether the user is an auditor. This attribute is subject to change.
- Is
Exec boolMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- Is
Non boolEditable - Indicates whether or not the admin can be edited or deleted.
- Is
Password boolExpired - Indicates whether or not an admin's password has expired.
- Is
Password boolLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- Is
Product boolUpdate Comm Enabled - Communication setting for Product Update.
- Is
Security boolReport Comm Enabled - Communication for Security Report is enabled.
- Is
Service boolUpdate Comm Enabled - Communication setting for Service Update.
- Password string
- The username of the admin user to be exported.
- Roles
List<zscaler.
Pulumi Package. Zia. Inputs. Admin Users Role> - Role of the admin. This is not required for an auditor.
- Email string
- Admin or auditor's email address.
- Login
Name string - The email address of the admin user to be exported.
- Username string
- The username of the admin user to be exported.
- Admin
Scope AdminEntities Users Admin Scope Entities Args - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- Admin
Scope stringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- Is
Auditor bool - Indicates whether the user is an auditor. This attribute is subject to change.
- Is
Exec boolMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- Is
Non boolEditable - Indicates whether or not the admin can be edited or deleted.
- Is
Password boolExpired - Indicates whether or not an admin's password has expired.
- Is
Password boolLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- Is
Product boolUpdate Comm Enabled - Communication setting for Product Update.
- Is
Security boolReport Comm Enabled - Communication for Security Report is enabled.
- Is
Service boolUpdate Comm Enabled - Communication setting for Service Update.
- Password string
- The username of the admin user to be exported.
- Roles
[]Admin
Users Role Args - Role of the admin. This is not required for an auditor.
- email String
- Admin or auditor's email address.
- login
Name String - The email address of the admin user to be exported.
- username String
- The username of the admin user to be exported.
- admin
Scope AdminEntities Users Admin Scope Entities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin
Scope StringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- is
Auditor Boolean - Indicates whether the user is an auditor. This attribute is subject to change.
- is
Exec BooleanMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is
Non BooleanEditable - Indicates whether or not the admin can be edited or deleted.
- is
Password BooleanExpired - Indicates whether or not an admin's password has expired.
- is
Password BooleanLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is
Product BooleanUpdate Comm Enabled - Communication setting for Product Update.
- is
Security BooleanReport Comm Enabled - Communication for Security Report is enabled.
- is
Service BooleanUpdate Comm Enabled - Communication setting for Service Update.
- password String
- The username of the admin user to be exported.
- roles
List<Admin
Users Role> - Role of the admin. This is not required for an auditor.
- email string
- Admin or auditor's email address.
- login
Name string - The email address of the admin user to be exported.
- username string
- The username of the admin user to be exported.
- admin
Scope AdminEntities Users Admin Scope Entities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin
Scope stringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments string
- Additional information about the admin or auditor.
- disabled boolean
- Indicates whether or not the admin account is disabled.
- is
Auditor boolean - Indicates whether the user is an auditor. This attribute is subject to change.
- is
Exec booleanMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is
Non booleanEditable - Indicates whether or not the admin can be edited or deleted.
- is
Password booleanExpired - Indicates whether or not an admin's password has expired.
- is
Password booleanLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is
Product booleanUpdate Comm Enabled - Communication setting for Product Update.
- is
Security booleanReport Comm Enabled - Communication for Security Report is enabled.
- is
Service booleanUpdate Comm Enabled - Communication setting for Service Update.
- password string
- The username of the admin user to be exported.
- roles
Admin
Users Role[] - Role of the admin. This is not required for an auditor.
- email str
- Admin or auditor's email address.
- login_
name str - The email address of the admin user to be exported.
- username str
- The username of the admin user to be exported.
- admin_
scope_ Adminentities Users Admin Scope Entities Args - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin_
scope_ strtype - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments str
- Additional information about the admin or auditor.
- disabled bool
- Indicates whether or not the admin account is disabled.
- is_
auditor bool - Indicates whether the user is an auditor. This attribute is subject to change.
- is_
exec_ boolmobile_ app_ enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is_
non_ booleditable - Indicates whether or not the admin can be edited or deleted.
- is_
password_ boolexpired - Indicates whether or not an admin's password has expired.
- is_
password_ boollogin_ allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is_
product_ boolupdate_ comm_ enabled - Communication setting for Product Update.
- is_
security_ boolreport_ comm_ enabled - Communication for Security Report is enabled.
- is_
service_ boolupdate_ comm_ enabled - Communication setting for Service Update.
- password str
- The username of the admin user to be exported.
- roles
Sequence[Admin
Users Role Args] - Role of the admin. This is not required for an auditor.
- email String
- Admin or auditor's email address.
- login
Name String - The email address of the admin user to be exported.
- username String
- The username of the admin user to be exported.
- admin
Scope Property MapEntities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin
Scope StringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- is
Auditor Boolean - Indicates whether the user is an auditor. This attribute is subject to change.
- is
Exec BooleanMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is
Non BooleanEditable - Indicates whether or not the admin can be edited or deleted.
- is
Password BooleanExpired - Indicates whether or not an admin's password has expired.
- is
Password BooleanLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is
Product BooleanUpdate Comm Enabled - Communication setting for Product Update.
- is
Security BooleanReport Comm Enabled - Communication for Security Report is enabled.
- is
Service BooleanUpdate Comm Enabled - Communication setting for Service Update.
- password String
- The username of the admin user to be exported.
- roles List<Property Map>
- Role of the admin. This is not required for an auditor.
Outputs
All input properties are implicitly available as output properties. Additionally, the AdminUsers resource produces the following output properties:
Look up Existing AdminUsers Resource
Get an existing AdminUsers resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AdminUsersState, opts?: CustomResourceOptions): AdminUsers
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
admin_id: Optional[int] = None,
admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
admin_scope_type: Optional[str] = None,
comments: Optional[str] = None,
disabled: Optional[bool] = None,
email: Optional[str] = None,
is_auditor: Optional[bool] = None,
is_exec_mobile_app_enabled: Optional[bool] = None,
is_non_editable: Optional[bool] = None,
is_password_expired: Optional[bool] = None,
is_password_login_allowed: Optional[bool] = None,
is_product_update_comm_enabled: Optional[bool] = None,
is_security_report_comm_enabled: Optional[bool] = None,
is_service_update_comm_enabled: Optional[bool] = None,
login_name: Optional[str] = None,
password: Optional[str] = None,
roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
username: Optional[str] = None) -> AdminUsers
func GetAdminUsers(ctx *Context, name string, id IDInput, state *AdminUsersState, opts ...ResourceOption) (*AdminUsers, error)
public static AdminUsers Get(string name, Input<string> id, AdminUsersState? state, CustomResourceOptions? opts = null)
public static AdminUsers get(String name, Output<String> id, AdminUsersState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Admin
Id int - Admin
Scope zscaler.Entities Pulumi Package. Zia. Inputs. Admin Users Admin Scope Entities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- Admin
Scope stringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- Email string
- Admin or auditor's email address.
- Is
Auditor bool - Indicates whether the user is an auditor. This attribute is subject to change.
- Is
Exec boolMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- Is
Non boolEditable - Indicates whether or not the admin can be edited or deleted.
- Is
Password boolExpired - Indicates whether or not an admin's password has expired.
- Is
Password boolLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- Is
Product boolUpdate Comm Enabled - Communication setting for Product Update.
- Is
Security boolReport Comm Enabled - Communication for Security Report is enabled.
- Is
Service boolUpdate Comm Enabled - Communication setting for Service Update.
- Login
Name string - The email address of the admin user to be exported.
- Password string
- The username of the admin user to be exported.
- Roles
List<zscaler.
Pulumi Package. Zia. Inputs. Admin Users Role> - Role of the admin. This is not required for an auditor.
- Username string
- The username of the admin user to be exported.
- Admin
Id int - Admin
Scope AdminEntities Users Admin Scope Entities Args - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- Admin
Scope stringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- Email string
- Admin or auditor's email address.
- Is
Auditor bool - Indicates whether the user is an auditor. This attribute is subject to change.
- Is
Exec boolMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- Is
Non boolEditable - Indicates whether or not the admin can be edited or deleted.
- Is
Password boolExpired - Indicates whether or not an admin's password has expired.
- Is
Password boolLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- Is
Product boolUpdate Comm Enabled - Communication setting for Product Update.
- Is
Security boolReport Comm Enabled - Communication for Security Report is enabled.
- Is
Service boolUpdate Comm Enabled - Communication setting for Service Update.
- Login
Name string - The email address of the admin user to be exported.
- Password string
- The username of the admin user to be exported.
- Roles
[]Admin
Users Role Args - Role of the admin. This is not required for an auditor.
- Username string
- The username of the admin user to be exported.
- admin
Id Integer - admin
Scope AdminEntities Users Admin Scope Entities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin
Scope StringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- email String
- Admin or auditor's email address.
- is
Auditor Boolean - Indicates whether the user is an auditor. This attribute is subject to change.
- is
Exec BooleanMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is
Non BooleanEditable - Indicates whether or not the admin can be edited or deleted.
- is
Password BooleanExpired - Indicates whether or not an admin's password has expired.
- is
Password BooleanLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is
Product BooleanUpdate Comm Enabled - Communication setting for Product Update.
- is
Security BooleanReport Comm Enabled - Communication for Security Report is enabled.
- is
Service BooleanUpdate Comm Enabled - Communication setting for Service Update.
- login
Name String - The email address of the admin user to be exported.
- password String
- The username of the admin user to be exported.
- roles
List<Admin
Users Role> - Role of the admin. This is not required for an auditor.
- username String
- The username of the admin user to be exported.
- admin
Id number - admin
Scope AdminEntities Users Admin Scope Entities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin
Scope stringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments string
- Additional information about the admin or auditor.
- disabled boolean
- Indicates whether or not the admin account is disabled.
- email string
- Admin or auditor's email address.
- is
Auditor boolean - Indicates whether the user is an auditor. This attribute is subject to change.
- is
Exec booleanMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is
Non booleanEditable - Indicates whether or not the admin can be edited or deleted.
- is
Password booleanExpired - Indicates whether or not an admin's password has expired.
- is
Password booleanLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is
Product booleanUpdate Comm Enabled - Communication setting for Product Update.
- is
Security booleanReport Comm Enabled - Communication for Security Report is enabled.
- is
Service booleanUpdate Comm Enabled - Communication setting for Service Update.
- login
Name string - The email address of the admin user to be exported.
- password string
- The username of the admin user to be exported.
- roles
Admin
Users Role[] - Role of the admin. This is not required for an auditor.
- username string
- The username of the admin user to be exported.
- admin_
id int - admin_
scope_ Adminentities Users Admin Scope Entities Args - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin_
scope_ strtype - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments str
- Additional information about the admin or auditor.
- disabled bool
- Indicates whether or not the admin account is disabled.
- email str
- Admin or auditor's email address.
- is_
auditor bool - Indicates whether the user is an auditor. This attribute is subject to change.
- is_
exec_ boolmobile_ app_ enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is_
non_ booleditable - Indicates whether or not the admin can be edited or deleted.
- is_
password_ boolexpired - Indicates whether or not an admin's password has expired.
- is_
password_ boollogin_ allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is_
product_ boolupdate_ comm_ enabled - Communication setting for Product Update.
- is_
security_ boolreport_ comm_ enabled - Communication for Security Report is enabled.
- is_
service_ boolupdate_ comm_ enabled - Communication setting for Service Update.
- login_
name str - The email address of the admin user to be exported.
- password str
- The username of the admin user to be exported.
- roles
Sequence[Admin
Users Role Args] - Role of the admin. This is not required for an auditor.
- username str
- The username of the admin user to be exported.
- admin
Id Number - admin
Scope Property MapEntities - Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin
Scope StringType - The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are:
ORGANIZATION
,DEPARTMENT
,LOCATION
,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- email String
- Admin or auditor's email address.
- is
Auditor Boolean - Indicates whether the user is an auditor. This attribute is subject to change.
- is
Exec BooleanMobile App Enabled - Indicates whether or not Executive Insights App access is enabled for the admin.
- is
Non BooleanEditable - Indicates whether or not the admin can be edited or deleted.
- is
Password BooleanExpired - Indicates whether or not an admin's password has expired.
- is
Password BooleanLogin Allowed - The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is
Product BooleanUpdate Comm Enabled - Communication setting for Product Update.
- is
Security BooleanReport Comm Enabled - Communication for Security Report is enabled.
- is
Service BooleanUpdate Comm Enabled - Communication setting for Service Update.
- login
Name String - The email address of the admin user to be exported.
- password String
- The username of the admin user to be exported.
- roles List<Property Map>
- Role of the admin. This is not required for an auditor.
- username String
- The username of the admin user to be exported.
Supporting Types
AdminUsersAdminScopeEntities, AdminUsersAdminScopeEntitiesArgs
- Ids List<int>
- Identifier that uniquely identifies an entity
- Ids []int
- Identifier that uniquely identifies an entity
- ids List<Integer>
- Identifier that uniquely identifies an entity
- ids number[]
- Identifier that uniquely identifies an entity
- ids Sequence[int]
- Identifier that uniquely identifies an entity
- ids List<Number>
- Identifier that uniquely identifies an entity
AdminUsersRole, AdminUsersRoleArgs
- Id int
- Identifier that uniquely identifies an entity
- Id int
- Identifier that uniquely identifies an entity
- id Integer
- Identifier that uniquely identifies an entity
- id number
- Identifier that uniquely identifies an entity
- id int
- Identifier that uniquely identifies an entity
- id Number
- Identifier that uniquely identifies an entity
Import
Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.
Visit
zia_admin_users can be imported by using <ADMIN ID>
or <LOGIN NAME>
as the import ID.
For example:
$ pulumi import zia:index/adminUsers:AdminUsers example <admin_id>
or
$ pulumi import zia:index/adminUsers:AdminUsers example <login_name>
⚠️ NOTE :: This provider do not import the password attribute value during the importing process.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.