zia.AdminUsers
Explore with Pulumi AI
The zia_admin_users resource allows the creation and management of ZIA admin user account created in the Zscaler Internet Access cloud or via the API.
Example Usage
Organization Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
    name: "Super Admin",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
    loginName: "john.smith@acme.com",
    userName: "John Smith",
    email: "john.smith@acme.com",
    isPasswordLoginAllowed: true,
    password: "*********************",
    isSecurityReportCommEnabled: true,
    isServiceUpdateCommEnabled: true,
    isProductUpdateCommEnabled: true,
    comments: "Administrator User",
    roles: [{
        id: superAdmin.then(superAdmin => superAdmin.id),
    }],
    adminScopeType: "ORGANIZATION",
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
    login_name="john.smith@acme.com",
    user_name="John Smith",
    email="john.smith@acme.com",
    is_password_login_allowed=True,
    password="*********************",
    is_security_report_comm_enabled=True,
    is_service_update_comm_enabled=True,
    is_product_update_comm_enabled=True,
    comments="Administrator User",
    roles=[zia.AdminUsersRoleArgs(
        id=super_admin.id,
    )],
    admin_scope_type="ORGANIZATION")
package main
import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
			Name: pulumi.StringRef("Super Admin"),
		}, nil)
		if err != nil {
			return err
		}
		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
			LoginName:                   pulumi.String("john.smith@acme.com"),
			UserName:                    pulumi.String("John Smith"),
			Email:                       pulumi.String("john.smith@acme.com"),
			IsPasswordLoginAllowed:      pulumi.Bool(true),
			Password:                    pulumi.String("*********************"),
			IsSecurityReportCommEnabled: pulumi.Bool(true),
			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
			IsProductUpdateCommEnabled:  pulumi.Bool(true),
			Comments:                    pulumi.String("Administrator User"),
			Roles: zia.AdminUsersRoleArray{
				&zia.AdminUsersRoleArgs{
					Id: pulumi.Int(superAdmin.Id),
				},
			},
			AdminScopeType: pulumi.String("ORGANIZATION"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() => 
{
    var superAdmin = Zia.GetAdminRoles.Invoke(new()
    {
        Name = "Super Admin",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    var johnSmith = new Zia.AdminUsers("johnSmith", new()
    {
        LoginName = "john.smith@acme.com",
        UserName = "John Smith",
        Email = "john.smith@acme.com",
        IsPasswordLoginAllowed = true,
        Password = "*********************",
        IsSecurityReportCommEnabled = true,
        IsServiceUpdateCommEnabled = true,
        IsProductUpdateCommEnabled = true,
        Comments = "Administrator User",
        Roles = new[]
        {
            new Zia.Inputs.AdminUsersRoleArgs
            {
                Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
            },
        },
        AdminScopeType = "ORGANIZATION",
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
            .name("Super Admin")
            .build());
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
            .loginName("john.smith@acme.com")
            .userName("John Smith")
            .email("john.smith@acme.com")
            .isPasswordLoginAllowed(true)
            .password("*********************")
            .isSecurityReportCommEnabled(true)
            .isServiceUpdateCommEnabled(true)
            .isProductUpdateCommEnabled(true)
            .comments("Administrator User")
            .roles(AdminUsersRoleArgs.builder()
                .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                .build())
            .adminScopeType("ORGANIZATION")
            .build());
    }
}
resources:
  ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
  johnSmith:
    type: zia:AdminUsers
    properties:
      loginName: john.smith@acme.com
      userName: John Smith
      email: john.smith@acme.com
      isPasswordLoginAllowed: true
      password: '*********************'
      isSecurityReportCommEnabled: true
      isServiceUpdateCommEnabled: true
      isProductUpdateCommEnabled: true
      comments: Administrator User
      roles:
        - id: ${superAdmin.id}
      adminScopeType: ORGANIZATION
variables:
  superAdmin:
    fn::invoke:
      Function: zia:getAdminRoles
      Arguments:
        name: Super Admin
Department Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
    name: "Super Admin",
});
const engineering = zia.getDepartmentManagement({
    name: "Engineering",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
    loginName: "john.smith@acme.com",
    userName: "John Smith",
    email: "john.smith@acme.com",
    isPasswordLoginAllowed: true,
    password: "*********************",
    isSecurityReportCommEnabled: true,
    isServiceUpdateCommEnabled: true,
    isProductUpdateCommEnabled: true,
    comments: "Administrator User",
    roles: [{
        id: superAdmin.then(superAdmin => superAdmin.id),
    }],
    adminScopeType: "DEPARTMENT",
    adminScopeEntities: {
        ids: [
            engineering.then(engineering => engineering.id),
            data.zia_department_management.sales.id,
        ],
    },
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
engineering = zia.get_department_management(name="Engineering")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
    login_name="john.smith@acme.com",
    user_name="John Smith",
    email="john.smith@acme.com",
    is_password_login_allowed=True,
    password="*********************",
    is_security_report_comm_enabled=True,
    is_service_update_comm_enabled=True,
    is_product_update_comm_enabled=True,
    comments="Administrator User",
    roles=[zia.AdminUsersRoleArgs(
        id=super_admin.id,
    )],
    admin_scope_type="DEPARTMENT",
    admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
        ids=[
            engineering.id,
            data["zia_department_management"]["sales"]["id"],
        ],
    ))
package main
import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
			Name: pulumi.StringRef("Super Admin"),
		}, nil)
		if err != nil {
			return err
		}
		engineering, err := zia.GetDepartmentManagement(ctx, &zia.GetDepartmentManagementArgs{
			Name: pulumi.StringRef("Engineering"),
		}, nil)
		if err != nil {
			return err
		}
		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
			LoginName:                   pulumi.String("john.smith@acme.com"),
			UserName:                    pulumi.String("John Smith"),
			Email:                       pulumi.String("john.smith@acme.com"),
			IsPasswordLoginAllowed:      pulumi.Bool(true),
			Password:                    pulumi.String("*********************"),
			IsSecurityReportCommEnabled: pulumi.Bool(true),
			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
			IsProductUpdateCommEnabled:  pulumi.Bool(true),
			Comments:                    pulumi.String("Administrator User"),
			Roles: zia.AdminUsersRoleArray{
				&zia.AdminUsersRoleArgs{
					Id: pulumi.Int(superAdmin.Id),
				},
			},
			AdminScopeType: pulumi.String("DEPARTMENT"),
			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
				Ids: pulumi.IntArray{
					pulumi.Int(engineering.Id),
					data.Zia_department_management.Sales.Id,
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() => 
{
    var superAdmin = Zia.GetAdminRoles.Invoke(new()
    {
        Name = "Super Admin",
    });
    var engineering = Zia.GetDepartmentManagement.Invoke(new()
    {
        Name = "Engineering",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    var johnSmith = new Zia.AdminUsers("johnSmith", new()
    {
        LoginName = "john.smith@acme.com",
        UserName = "John Smith",
        Email = "john.smith@acme.com",
        IsPasswordLoginAllowed = true,
        Password = "*********************",
        IsSecurityReportCommEnabled = true,
        IsServiceUpdateCommEnabled = true,
        IsProductUpdateCommEnabled = true,
        Comments = "Administrator User",
        Roles = new[]
        {
            new Zia.Inputs.AdminUsersRoleArgs
            {
                Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
            },
        },
        AdminScopeType = "DEPARTMENT",
        AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
        {
            Ids = new[]
            {
                engineering.Apply(getDepartmentManagementResult => getDepartmentManagementResult.Id),
                data.Zia_department_management.Sales.Id,
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetDepartmentManagementArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
            .name("Super Admin")
            .build());
        final var engineering = ZiaFunctions.getDepartmentManagement(GetDepartmentManagementArgs.builder()
            .name("Engineering")
            .build());
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
            .loginName("john.smith@acme.com")
            .userName("John Smith")
            .email("john.smith@acme.com")
            .isPasswordLoginAllowed(true)
            .password("*********************")
            .isSecurityReportCommEnabled(true)
            .isServiceUpdateCommEnabled(true)
            .isProductUpdateCommEnabled(true)
            .comments("Administrator User")
            .roles(AdminUsersRoleArgs.builder()
                .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                .build())
            .adminScopeType("DEPARTMENT")
            .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                .ids(                
                    engineering.applyValue(getDepartmentManagementResult -> getDepartmentManagementResult.id()),
                    data.zia_department_management().sales().id())
                .build())
            .build());
    }
}
resources:
  ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
  johnSmith:
    type: zia:AdminUsers
    properties:
      loginName: john.smith@acme.com
      userName: John Smith
      email: john.smith@acme.com
      isPasswordLoginAllowed: true
      password: '*********************'
      isSecurityReportCommEnabled: true
      isServiceUpdateCommEnabled: true
      isProductUpdateCommEnabled: true
      comments: Administrator User
      roles:
        - id: ${superAdmin.id}
      adminScopeType: DEPARTMENT
      adminScopeEntities:
        ids:
          - ${engineering.id}
          - ${data.zia_department_management.sales.id}
variables:
  superAdmin:
    fn::invoke:
      Function: zia:getAdminRoles
      Arguments:
        name: Super Admin
  engineering:
    fn::invoke:
      Function: zia:getDepartmentManagement
      Arguments:
        name: Engineering
Location Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
    name: "Super Admin",
});
const auSydneyBranch01 = zia.getLocationManagement({
    name: "AU - Sydney - Branch01",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
    loginName: "john.smith@acme.com",
    userName: "John Smith",
    email: "john.smith@acme.com",
    isPasswordLoginAllowed: true,
    password: "*********************",
    isSecurityReportCommEnabled: true,
    isServiceUpdateCommEnabled: true,
    isProductUpdateCommEnabled: true,
    comments: "Administrator User",
    roles: [{
        id: superAdmin.then(superAdmin => superAdmin.id),
    }],
    adminScopeType: "LOCATION",
    adminScopeEntities: {
        ids: [auSydneyBranch01.then(auSydneyBranch01 => auSydneyBranch01.id)],
    },
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
au_sydney_branch01 = zia.get_location_management(name="AU - Sydney - Branch01")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
    login_name="john.smith@acme.com",
    user_name="John Smith",
    email="john.smith@acme.com",
    is_password_login_allowed=True,
    password="*********************",
    is_security_report_comm_enabled=True,
    is_service_update_comm_enabled=True,
    is_product_update_comm_enabled=True,
    comments="Administrator User",
    roles=[zia.AdminUsersRoleArgs(
        id=super_admin.id,
    )],
    admin_scope_type="LOCATION",
    admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
        ids=[au_sydney_branch01.id],
    ))
package main
import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
			Name: pulumi.StringRef("Super Admin"),
		}, nil)
		if err != nil {
			return err
		}
		auSydneyBranch01, err := zia.LookupLocationManagement(ctx, &zia.LookupLocationManagementArgs{
			Name: pulumi.StringRef("AU - Sydney - Branch01"),
		}, nil)
		if err != nil {
			return err
		}
		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
			LoginName:                   pulumi.String("john.smith@acme.com"),
			UserName:                    pulumi.String("John Smith"),
			Email:                       pulumi.String("john.smith@acme.com"),
			IsPasswordLoginAllowed:      pulumi.Bool(true),
			Password:                    pulumi.String("*********************"),
			IsSecurityReportCommEnabled: pulumi.Bool(true),
			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
			IsProductUpdateCommEnabled:  pulumi.Bool(true),
			Comments:                    pulumi.String("Administrator User"),
			Roles: zia.AdminUsersRoleArray{
				&zia.AdminUsersRoleArgs{
					Id: pulumi.Int(superAdmin.Id),
				},
			},
			AdminScopeType: pulumi.String("LOCATION"),
			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
				Ids: pulumi.IntArray{
					pulumi.Int(auSydneyBranch01.Id),
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() => 
{
    var superAdmin = Zia.GetAdminRoles.Invoke(new()
    {
        Name = "Super Admin",
    });
    var auSydneyBranch01 = Zia.GetLocationManagement.Invoke(new()
    {
        Name = "AU - Sydney - Branch01",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    var johnSmith = new Zia.AdminUsers("johnSmith", new()
    {
        LoginName = "john.smith@acme.com",
        UserName = "John Smith",
        Email = "john.smith@acme.com",
        IsPasswordLoginAllowed = true,
        Password = "*********************",
        IsSecurityReportCommEnabled = true,
        IsServiceUpdateCommEnabled = true,
        IsProductUpdateCommEnabled = true,
        Comments = "Administrator User",
        Roles = new[]
        {
            new Zia.Inputs.AdminUsersRoleArgs
            {
                Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
            },
        },
        AdminScopeType = "LOCATION",
        AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
        {
            Ids = new[]
            {
                auSydneyBranch01.Apply(getLocationManagementResult => getLocationManagementResult.Id),
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetLocationManagementArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
            .name("Super Admin")
            .build());
        final var auSydneyBranch01 = ZiaFunctions.getLocationManagement(GetLocationManagementArgs.builder()
            .name("AU - Sydney - Branch01")
            .build());
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
            .loginName("john.smith@acme.com")
            .userName("John Smith")
            .email("john.smith@acme.com")
            .isPasswordLoginAllowed(true)
            .password("*********************")
            .isSecurityReportCommEnabled(true)
            .isServiceUpdateCommEnabled(true)
            .isProductUpdateCommEnabled(true)
            .comments("Administrator User")
            .roles(AdminUsersRoleArgs.builder()
                .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                .build())
            .adminScopeType("LOCATION")
            .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                .ids(auSydneyBranch01.applyValue(getLocationManagementResult -> getLocationManagementResult.id()))
                .build())
            .build());
    }
}
resources:
  ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
  johnSmith:
    type: zia:AdminUsers
    properties:
      loginName: john.smith@acme.com
      userName: John Smith
      email: john.smith@acme.com
      isPasswordLoginAllowed: true
      password: '*********************'
      isSecurityReportCommEnabled: true
      isServiceUpdateCommEnabled: true
      isProductUpdateCommEnabled: true
      comments: Administrator User
      roles:
        - id: ${superAdmin.id}
      adminScopeType: LOCATION
      adminScopeEntities:
        ids:
          - ${auSydneyBranch01.id}
variables:
  superAdmin:
    fn::invoke:
      Function: zia:getAdminRoles
      Arguments:
        name: Super Admin
  auSydneyBranch01:
    fn::invoke:
      Function: zia:getLocationManagement
      Arguments:
        name: AU - Sydney - Branch01
Location Group Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
    name: "Super Admin",
});
const corporateUserTrafficGroup = zia.getLocationGroups({
    name: "Corporate User Traffic Group",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
    loginName: "john.smith@acme.com",
    userName: "John Smith",
    email: "john.smith@acme.com",
    isPasswordLoginAllowed: true,
    password: "*********************",
    isSecurityReportCommEnabled: true,
    isServiceUpdateCommEnabled: true,
    isProductUpdateCommEnabled: true,
    comments: "Administrator User",
    roles: [{
        id: superAdmin.then(superAdmin => superAdmin.id),
    }],
    adminScopeType: "LOCATION_GROUP",
    adminScopeEntities: {
        ids: [corporateUserTrafficGroup.then(corporateUserTrafficGroup => corporateUserTrafficGroup.id)],
    },
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
corporate_user_traffic_group = zia.get_location_groups(name="Corporate User Traffic Group")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
    login_name="john.smith@acme.com",
    user_name="John Smith",
    email="john.smith@acme.com",
    is_password_login_allowed=True,
    password="*********************",
    is_security_report_comm_enabled=True,
    is_service_update_comm_enabled=True,
    is_product_update_comm_enabled=True,
    comments="Administrator User",
    roles=[zia.AdminUsersRoleArgs(
        id=super_admin.id,
    )],
    admin_scope_type="LOCATION_GROUP",
    admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
        ids=[corporate_user_traffic_group.id],
    ))
package main
import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
			Name: pulumi.StringRef("Super Admin"),
		}, nil)
		if err != nil {
			return err
		}
		corporateUserTrafficGroup, err := zia.GetLocationGroups(ctx, &zia.GetLocationGroupsArgs{
			Name: pulumi.StringRef("Corporate User Traffic Group"),
		}, nil)
		if err != nil {
			return err
		}
		// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
		_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
			LoginName:                   pulumi.String("john.smith@acme.com"),
			UserName:                    pulumi.String("John Smith"),
			Email:                       pulumi.String("john.smith@acme.com"),
			IsPasswordLoginAllowed:      pulumi.Bool(true),
			Password:                    pulumi.String("*********************"),
			IsSecurityReportCommEnabled: pulumi.Bool(true),
			IsServiceUpdateCommEnabled:  pulumi.Bool(true),
			IsProductUpdateCommEnabled:  pulumi.Bool(true),
			Comments:                    pulumi.String("Administrator User"),
			Roles: zia.AdminUsersRoleArray{
				&zia.AdminUsersRoleArgs{
					Id: pulumi.Int(superAdmin.Id),
				},
			},
			AdminScopeType: pulumi.String("LOCATION_GROUP"),
			AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
				Ids: pulumi.IntArray{
					pulumi.Int(corporateUserTrafficGroup.Id),
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() => 
{
    var superAdmin = Zia.GetAdminRoles.Invoke(new()
    {
        Name = "Super Admin",
    });
    var corporateUserTrafficGroup = Zia.GetLocationGroups.Invoke(new()
    {
        Name = "Corporate User Traffic Group",
    });
    //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
    var johnSmith = new Zia.AdminUsers("johnSmith", new()
    {
        LoginName = "john.smith@acme.com",
        UserName = "John Smith",
        Email = "john.smith@acme.com",
        IsPasswordLoginAllowed = true,
        Password = "*********************",
        IsSecurityReportCommEnabled = true,
        IsServiceUpdateCommEnabled = true,
        IsProductUpdateCommEnabled = true,
        Comments = "Administrator User",
        Roles = new[]
        {
            new Zia.Inputs.AdminUsersRoleArgs
            {
                Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
            },
        },
        AdminScopeType = "LOCATION_GROUP",
        AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
        {
            Ids = new[]
            {
                corporateUserTrafficGroup.Apply(getLocationGroupsResult => getLocationGroupsResult.Id),
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetLocationGroupsArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
            .name("Super Admin")
            .build());
        final var corporateUserTrafficGroup = ZiaFunctions.getLocationGroups(GetLocationGroupsArgs.builder()
            .name("Corporate User Traffic Group")
            .build());
        //######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
        var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()        
            .loginName("john.smith@acme.com")
            .userName("John Smith")
            .email("john.smith@acme.com")
            .isPasswordLoginAllowed(true)
            .password("*********************")
            .isSecurityReportCommEnabled(true)
            .isServiceUpdateCommEnabled(true)
            .isProductUpdateCommEnabled(true)
            .comments("Administrator User")
            .roles(AdminUsersRoleArgs.builder()
                .id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
                .build())
            .adminScopeType("LOCATION_GROUP")
            .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
                .ids(corporateUserTrafficGroup.applyValue(getLocationGroupsResult -> getLocationGroupsResult.id()))
                .build())
            .build());
    }
}
resources:
  ######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
  johnSmith:
    type: zia:AdminUsers
    properties:
      loginName: john.smith@acme.com
      userName: John Smith
      email: john.smith@acme.com
      isPasswordLoginAllowed: true
      password: '*********************'
      isSecurityReportCommEnabled: true
      isServiceUpdateCommEnabled: true
      isProductUpdateCommEnabled: true
      comments: Administrator User
      roles:
        - id: ${superAdmin.id}
      adminScopeType: LOCATION_GROUP
      adminScopeEntities:
        ids:
          - ${corporateUserTrafficGroup.id}
variables:
  superAdmin:
    fn::invoke:
      Function: zia:getAdminRoles
      Arguments:
        name: Super Admin
  corporateUserTrafficGroup:
    fn::invoke:
      Function: zia:getLocationGroups
      Arguments:
        name: Corporate User Traffic Group
Create AdminUsers Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AdminUsers(name: string, args: AdminUsersArgs, opts?: CustomResourceOptions);@overload
def AdminUsers(resource_name: str,
               args: AdminUsersArgs,
               opts: Optional[ResourceOptions] = None)
@overload
def AdminUsers(resource_name: str,
               opts: Optional[ResourceOptions] = None,
               email: Optional[str] = None,
               username: Optional[str] = None,
               login_name: Optional[str] = None,
               is_password_expired: Optional[bool] = None,
               is_product_update_comm_enabled: Optional[bool] = None,
               is_auditor: Optional[bool] = None,
               is_exec_mobile_app_enabled: Optional[bool] = None,
               is_non_editable: Optional[bool] = None,
               admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
               is_password_login_allowed: Optional[bool] = None,
               disabled: Optional[bool] = None,
               is_security_report_comm_enabled: Optional[bool] = None,
               is_service_update_comm_enabled: Optional[bool] = None,
               comments: Optional[str] = None,
               password: Optional[str] = None,
               roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
               admin_scope_type: Optional[str] = None)func NewAdminUsers(ctx *Context, name string, args AdminUsersArgs, opts ...ResourceOption) (*AdminUsers, error)public AdminUsers(string name, AdminUsersArgs args, CustomResourceOptions? opts = null)
public AdminUsers(String name, AdminUsersArgs args)
public AdminUsers(String name, AdminUsersArgs args, CustomResourceOptions options)
type: zia:AdminUsers
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var adminUsersResource = new Zia.AdminUsers("adminUsersResource", new()
{
    Email = "string",
    Username = "string",
    LoginName = "string",
    IsPasswordExpired = false,
    IsProductUpdateCommEnabled = false,
    IsAuditor = false,
    IsExecMobileAppEnabled = false,
    IsNonEditable = false,
    AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
    {
        Ids = new[]
        {
            0,
        },
    },
    IsPasswordLoginAllowed = false,
    Disabled = false,
    IsSecurityReportCommEnabled = false,
    IsServiceUpdateCommEnabled = false,
    Comments = "string",
    Password = "string",
    Roles = new[]
    {
        new Zia.Inputs.AdminUsersRoleArgs
        {
            Id = 0,
        },
    },
    AdminScopeType = "string",
});
example, err := zia.NewAdminUsers(ctx, "adminUsersResource", &zia.AdminUsersArgs{
	Email:                      pulumi.String("string"),
	Username:                   pulumi.String("string"),
	LoginName:                  pulumi.String("string"),
	IsPasswordExpired:          pulumi.Bool(false),
	IsProductUpdateCommEnabled: pulumi.Bool(false),
	IsAuditor:                  pulumi.Bool(false),
	IsExecMobileAppEnabled:     pulumi.Bool(false),
	IsNonEditable:              pulumi.Bool(false),
	AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
		Ids: pulumi.IntArray{
			pulumi.Int(0),
		},
	},
	IsPasswordLoginAllowed:      pulumi.Bool(false),
	Disabled:                    pulumi.Bool(false),
	IsSecurityReportCommEnabled: pulumi.Bool(false),
	IsServiceUpdateCommEnabled:  pulumi.Bool(false),
	Comments:                    pulumi.String("string"),
	Password:                    pulumi.String("string"),
	Roles: zia.AdminUsersRoleArray{
		&zia.AdminUsersRoleArgs{
			Id: pulumi.Int(0),
		},
	},
	AdminScopeType: pulumi.String("string"),
})
var adminUsersResource = new AdminUsers("adminUsersResource", AdminUsersArgs.builder()
    .email("string")
    .username("string")
    .loginName("string")
    .isPasswordExpired(false)
    .isProductUpdateCommEnabled(false)
    .isAuditor(false)
    .isExecMobileAppEnabled(false)
    .isNonEditable(false)
    .adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
        .ids(0)
        .build())
    .isPasswordLoginAllowed(false)
    .disabled(false)
    .isSecurityReportCommEnabled(false)
    .isServiceUpdateCommEnabled(false)
    .comments("string")
    .password("string")
    .roles(AdminUsersRoleArgs.builder()
        .id(0)
        .build())
    .adminScopeType("string")
    .build());
admin_users_resource = zia.AdminUsers("adminUsersResource",
    email="string",
    username="string",
    login_name="string",
    is_password_expired=False,
    is_product_update_comm_enabled=False,
    is_auditor=False,
    is_exec_mobile_app_enabled=False,
    is_non_editable=False,
    admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
        ids=[0],
    ),
    is_password_login_allowed=False,
    disabled=False,
    is_security_report_comm_enabled=False,
    is_service_update_comm_enabled=False,
    comments="string",
    password="string",
    roles=[zia.AdminUsersRoleArgs(
        id=0,
    )],
    admin_scope_type="string")
const adminUsersResource = new zia.AdminUsers("adminUsersResource", {
    email: "string",
    username: "string",
    loginName: "string",
    isPasswordExpired: false,
    isProductUpdateCommEnabled: false,
    isAuditor: false,
    isExecMobileAppEnabled: false,
    isNonEditable: false,
    adminScopeEntities: {
        ids: [0],
    },
    isPasswordLoginAllowed: false,
    disabled: false,
    isSecurityReportCommEnabled: false,
    isServiceUpdateCommEnabled: false,
    comments: "string",
    password: "string",
    roles: [{
        id: 0,
    }],
    adminScopeType: "string",
});
type: zia:AdminUsers
properties:
    adminScopeEntities:
        ids:
            - 0
    adminScopeType: string
    comments: string
    disabled: false
    email: string
    isAuditor: false
    isExecMobileAppEnabled: false
    isNonEditable: false
    isPasswordExpired: false
    isPasswordLoginAllowed: false
    isProductUpdateCommEnabled: false
    isSecurityReportCommEnabled: false
    isServiceUpdateCommEnabled: false
    loginName: string
    password: string
    roles:
        - id: 0
    username: string
AdminUsers Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The AdminUsers resource accepts the following input properties:
- Email string
- Admin or auditor's email address.
- LoginName string
- The email address of the admin user to be exported.
- Username string
- The username of the admin user to be exported.
- AdminScope zscaler.Entities Pulumi Package. Zia. Inputs. Admin Users Admin Scope Entities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- AdminScope stringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- IsAuditor bool
- Indicates whether the user is an auditor. This attribute is subject to change.
- IsExec boolMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- IsNon boolEditable 
- Indicates whether or not the admin can be edited or deleted.
- IsPassword boolExpired 
- Indicates whether or not an admin's password has expired.
- IsPassword boolLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- IsProduct boolUpdate Comm Enabled 
- Communication setting for Product Update.
- IsSecurity boolReport Comm Enabled 
- Communication for Security Report is enabled.
- IsService boolUpdate Comm Enabled 
- Communication setting for Service Update.
- Password string
- The username of the admin user to be exported.
- Roles
List<zscaler.Pulumi Package. Zia. Inputs. Admin Users Role> 
- Role of the admin. This is not required for an auditor.
- Email string
- Admin or auditor's email address.
- LoginName string
- The email address of the admin user to be exported.
- Username string
- The username of the admin user to be exported.
- AdminScope AdminEntities Users Admin Scope Entities Args 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- AdminScope stringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- IsAuditor bool
- Indicates whether the user is an auditor. This attribute is subject to change.
- IsExec boolMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- IsNon boolEditable 
- Indicates whether or not the admin can be edited or deleted.
- IsPassword boolExpired 
- Indicates whether or not an admin's password has expired.
- IsPassword boolLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- IsProduct boolUpdate Comm Enabled 
- Communication setting for Product Update.
- IsSecurity boolReport Comm Enabled 
- Communication for Security Report is enabled.
- IsService boolUpdate Comm Enabled 
- Communication setting for Service Update.
- Password string
- The username of the admin user to be exported.
- Roles
[]AdminUsers Role Args 
- Role of the admin. This is not required for an auditor.
- email String
- Admin or auditor's email address.
- loginName String
- The email address of the admin user to be exported.
- username String
- The username of the admin user to be exported.
- adminScope AdminEntities Users Admin Scope Entities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- adminScope StringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- isAuditor Boolean
- Indicates whether the user is an auditor. This attribute is subject to change.
- isExec BooleanMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- isNon BooleanEditable 
- Indicates whether or not the admin can be edited or deleted.
- isPassword BooleanExpired 
- Indicates whether or not an admin's password has expired.
- isPassword BooleanLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- isProduct BooleanUpdate Comm Enabled 
- Communication setting for Product Update.
- isSecurity BooleanReport Comm Enabled 
- Communication for Security Report is enabled.
- isService BooleanUpdate Comm Enabled 
- Communication setting for Service Update.
- password String
- The username of the admin user to be exported.
- roles
List<AdminUsers Role> 
- Role of the admin. This is not required for an auditor.
- email string
- Admin or auditor's email address.
- loginName string
- The email address of the admin user to be exported.
- username string
- The username of the admin user to be exported.
- adminScope AdminEntities Users Admin Scope Entities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- adminScope stringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments string
- Additional information about the admin or auditor.
- disabled boolean
- Indicates whether or not the admin account is disabled.
- isAuditor boolean
- Indicates whether the user is an auditor. This attribute is subject to change.
- isExec booleanMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- isNon booleanEditable 
- Indicates whether or not the admin can be edited or deleted.
- isPassword booleanExpired 
- Indicates whether or not an admin's password has expired.
- isPassword booleanLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- isProduct booleanUpdate Comm Enabled 
- Communication setting for Product Update.
- isSecurity booleanReport Comm Enabled 
- Communication for Security Report is enabled.
- isService booleanUpdate Comm Enabled 
- Communication setting for Service Update.
- password string
- The username of the admin user to be exported.
- roles
AdminUsers Role[] 
- Role of the admin. This is not required for an auditor.
- email str
- Admin or auditor's email address.
- login_name str
- The email address of the admin user to be exported.
- username str
- The username of the admin user to be exported.
- admin_scope_ Adminentities Users Admin Scope Entities Args 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin_scope_ strtype 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments str
- Additional information about the admin or auditor.
- disabled bool
- Indicates whether or not the admin account is disabled.
- is_auditor bool
- Indicates whether the user is an auditor. This attribute is subject to change.
- is_exec_ boolmobile_ app_ enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- is_non_ booleditable 
- Indicates whether or not the admin can be edited or deleted.
- is_password_ boolexpired 
- Indicates whether or not an admin's password has expired.
- is_password_ boollogin_ allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is_product_ boolupdate_ comm_ enabled 
- Communication setting for Product Update.
- is_security_ boolreport_ comm_ enabled 
- Communication for Security Report is enabled.
- is_service_ boolupdate_ comm_ enabled 
- Communication setting for Service Update.
- password str
- The username of the admin user to be exported.
- roles
Sequence[AdminUsers Role Args] 
- Role of the admin. This is not required for an auditor.
- email String
- Admin or auditor's email address.
- loginName String
- The email address of the admin user to be exported.
- username String
- The username of the admin user to be exported.
- adminScope Property MapEntities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- adminScope StringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- isAuditor Boolean
- Indicates whether the user is an auditor. This attribute is subject to change.
- isExec BooleanMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- isNon BooleanEditable 
- Indicates whether or not the admin can be edited or deleted.
- isPassword BooleanExpired 
- Indicates whether or not an admin's password has expired.
- isPassword BooleanLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- isProduct BooleanUpdate Comm Enabled 
- Communication setting for Product Update.
- isSecurity BooleanReport Comm Enabled 
- Communication for Security Report is enabled.
- isService BooleanUpdate Comm Enabled 
- Communication setting for Service Update.
- password String
- The username of the admin user to be exported.
- roles List<Property Map>
- Role of the admin. This is not required for an auditor.
Outputs
All input properties are implicitly available as output properties. Additionally, the AdminUsers resource produces the following output properties:
Look up Existing AdminUsers Resource
Get an existing AdminUsers resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AdminUsersState, opts?: CustomResourceOptions): AdminUsers@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        admin_id: Optional[int] = None,
        admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
        admin_scope_type: Optional[str] = None,
        comments: Optional[str] = None,
        disabled: Optional[bool] = None,
        email: Optional[str] = None,
        is_auditor: Optional[bool] = None,
        is_exec_mobile_app_enabled: Optional[bool] = None,
        is_non_editable: Optional[bool] = None,
        is_password_expired: Optional[bool] = None,
        is_password_login_allowed: Optional[bool] = None,
        is_product_update_comm_enabled: Optional[bool] = None,
        is_security_report_comm_enabled: Optional[bool] = None,
        is_service_update_comm_enabled: Optional[bool] = None,
        login_name: Optional[str] = None,
        password: Optional[str] = None,
        roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
        username: Optional[str] = None) -> AdminUsersfunc GetAdminUsers(ctx *Context, name string, id IDInput, state *AdminUsersState, opts ...ResourceOption) (*AdminUsers, error)public static AdminUsers Get(string name, Input<string> id, AdminUsersState? state, CustomResourceOptions? opts = null)public static AdminUsers get(String name, Output<String> id, AdminUsersState state, CustomResourceOptions options)Resource lookup is not supported in YAML- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- AdminId int
- AdminScope zscaler.Entities Pulumi Package. Zia. Inputs. Admin Users Admin Scope Entities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- AdminScope stringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- Email string
- Admin or auditor's email address.
- IsAuditor bool
- Indicates whether the user is an auditor. This attribute is subject to change.
- IsExec boolMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- IsNon boolEditable 
- Indicates whether or not the admin can be edited or deleted.
- IsPassword boolExpired 
- Indicates whether or not an admin's password has expired.
- IsPassword boolLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- IsProduct boolUpdate Comm Enabled 
- Communication setting for Product Update.
- IsSecurity boolReport Comm Enabled 
- Communication for Security Report is enabled.
- IsService boolUpdate Comm Enabled 
- Communication setting for Service Update.
- LoginName string
- The email address of the admin user to be exported.
- Password string
- The username of the admin user to be exported.
- Roles
List<zscaler.Pulumi Package. Zia. Inputs. Admin Users Role> 
- Role of the admin. This is not required for an auditor.
- Username string
- The username of the admin user to be exported.
- AdminId int
- AdminScope AdminEntities Users Admin Scope Entities Args 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- AdminScope stringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Indicates whether or not the admin account is disabled.
- Email string
- Admin or auditor's email address.
- IsAuditor bool
- Indicates whether the user is an auditor. This attribute is subject to change.
- IsExec boolMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- IsNon boolEditable 
- Indicates whether or not the admin can be edited or deleted.
- IsPassword boolExpired 
- Indicates whether or not an admin's password has expired.
- IsPassword boolLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- IsProduct boolUpdate Comm Enabled 
- Communication setting for Product Update.
- IsSecurity boolReport Comm Enabled 
- Communication for Security Report is enabled.
- IsService boolUpdate Comm Enabled 
- Communication setting for Service Update.
- LoginName string
- The email address of the admin user to be exported.
- Password string
- The username of the admin user to be exported.
- Roles
[]AdminUsers Role Args 
- Role of the admin. This is not required for an auditor.
- Username string
- The username of the admin user to be exported.
- adminId Integer
- adminScope AdminEntities Users Admin Scope Entities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- adminScope StringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- email String
- Admin or auditor's email address.
- isAuditor Boolean
- Indicates whether the user is an auditor. This attribute is subject to change.
- isExec BooleanMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- isNon BooleanEditable 
- Indicates whether or not the admin can be edited or deleted.
- isPassword BooleanExpired 
- Indicates whether or not an admin's password has expired.
- isPassword BooleanLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- isProduct BooleanUpdate Comm Enabled 
- Communication setting for Product Update.
- isSecurity BooleanReport Comm Enabled 
- Communication for Security Report is enabled.
- isService BooleanUpdate Comm Enabled 
- Communication setting for Service Update.
- loginName String
- The email address of the admin user to be exported.
- password String
- The username of the admin user to be exported.
- roles
List<AdminUsers Role> 
- Role of the admin. This is not required for an auditor.
- username String
- The username of the admin user to be exported.
- adminId number
- adminScope AdminEntities Users Admin Scope Entities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- adminScope stringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments string
- Additional information about the admin or auditor.
- disabled boolean
- Indicates whether or not the admin account is disabled.
- email string
- Admin or auditor's email address.
- isAuditor boolean
- Indicates whether the user is an auditor. This attribute is subject to change.
- isExec booleanMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- isNon booleanEditable 
- Indicates whether or not the admin can be edited or deleted.
- isPassword booleanExpired 
- Indicates whether or not an admin's password has expired.
- isPassword booleanLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- isProduct booleanUpdate Comm Enabled 
- Communication setting for Product Update.
- isSecurity booleanReport Comm Enabled 
- Communication for Security Report is enabled.
- isService booleanUpdate Comm Enabled 
- Communication setting for Service Update.
- loginName string
- The email address of the admin user to be exported.
- password string
- The username of the admin user to be exported.
- roles
AdminUsers Role[] 
- Role of the admin. This is not required for an auditor.
- username string
- The username of the admin user to be exported.
- admin_id int
- admin_scope_ Adminentities Users Admin Scope Entities Args 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- admin_scope_ strtype 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments str
- Additional information about the admin or auditor.
- disabled bool
- Indicates whether or not the admin account is disabled.
- email str
- Admin or auditor's email address.
- is_auditor bool
- Indicates whether the user is an auditor. This attribute is subject to change.
- is_exec_ boolmobile_ app_ enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- is_non_ booleditable 
- Indicates whether or not the admin can be edited or deleted.
- is_password_ boolexpired 
- Indicates whether or not an admin's password has expired.
- is_password_ boollogin_ allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- is_product_ boolupdate_ comm_ enabled 
- Communication setting for Product Update.
- is_security_ boolreport_ comm_ enabled 
- Communication for Security Report is enabled.
- is_service_ boolupdate_ comm_ enabled 
- Communication setting for Service Update.
- login_name str
- The email address of the admin user to be exported.
- password str
- The username of the admin user to be exported.
- roles
Sequence[AdminUsers Role Args] 
- Role of the admin. This is not required for an auditor.
- username str
- The username of the admin user to be exported.
- adminId Number
- adminScope Property MapEntities 
- Based on the admin scope type, the entities can be the ID/name pair of departments, locations, or location groups.
- adminScope StringType 
- The admin's scope. A scope is required for admins, but not applicable to auditors. This attribute is subject to change. Support values are: ORGANIZATION,DEPARTMENT,LOCATION,LOCATION_GROUP
- comments String
- Additional information about the admin or auditor.
- disabled Boolean
- Indicates whether or not the admin account is disabled.
- email String
- Admin or auditor's email address.
- isAuditor Boolean
- Indicates whether the user is an auditor. This attribute is subject to change.
- isExec BooleanMobile App Enabled 
- Indicates whether or not Executive Insights App access is enabled for the admin.
- isNon BooleanEditable 
- Indicates whether or not the admin can be edited or deleted.
- isPassword BooleanExpired 
- Indicates whether or not an admin's password has expired.
- isPassword BooleanLogin Allowed 
- The default is true when SAML Authentication is disabled. When SAML Authentication is enabled, this can be set to false in order to force the admin to login via SSO only.
- isProduct BooleanUpdate Comm Enabled 
- Communication setting for Product Update.
- isSecurity BooleanReport Comm Enabled 
- Communication for Security Report is enabled.
- isService BooleanUpdate Comm Enabled 
- Communication setting for Service Update.
- loginName String
- The email address of the admin user to be exported.
- password String
- The username of the admin user to be exported.
- roles List<Property Map>
- Role of the admin. This is not required for an auditor.
- username String
- The username of the admin user to be exported.
Supporting Types
AdminUsersAdminScopeEntities, AdminUsersAdminScopeEntitiesArgs          
- Ids List<int>
- Identifier that uniquely identifies an entity
- Ids []int
- Identifier that uniquely identifies an entity
- ids List<Integer>
- Identifier that uniquely identifies an entity
- ids number[]
- Identifier that uniquely identifies an entity
- ids Sequence[int]
- Identifier that uniquely identifies an entity
- ids List<Number>
- Identifier that uniquely identifies an entity
AdminUsersRole, AdminUsersRoleArgs      
- Id int
- Identifier that uniquely identifies an entity
- Id int
- Identifier that uniquely identifies an entity
- id Integer
- Identifier that uniquely identifies an entity
- id number
- Identifier that uniquely identifies an entity
- id int
- Identifier that uniquely identifies an entity
- id Number
- Identifier that uniquely identifies an entity
Import
Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.
Visit
zia_admin_users can be imported by using <ADMIN ID> or <LOGIN NAME> as the import ID.
For example:
$ pulumi import zia:index/adminUsers:AdminUsers example <admin_id>
or
$ pulumi import zia:index/adminUsers:AdminUsers example <login_name>
⚠️ NOTE :: This provider do not import the password attribute value during the importing process.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the ziaTerraform Provider.
