Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
AuthenticationRule data source
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as scm from "@pulumi/scm";
const ruleToFetch = new scm.AuthenticationRule("rule_to_fetch", {
name: "rule-to-be-queried-scm-105",
description: "This rule is created purely to test the data source functionality.",
position: "pre",
folder: "All",
destinations: ["any"],
froms: ["any"],
tos: ["any"],
sources: ["any"],
services: [
"service-http",
"service-https",
],
sourceUsers: ["any"],
timeout: 1200,
negateSource: false,
negateDestination: false,
});
const ruleData = scm.getAuthenticationRuleOutput({
id: ruleToFetch.id,
});
export const fetchedRuleId = ruleData.apply(ruleData => ruleData.id);
export const fetchedRuleTimeout = ruleData.apply(ruleData => ruleData.timeout);
import pulumi
import pulumi_scm as scm
rule_to_fetch = scm.AuthenticationRule("rule_to_fetch",
name="rule-to-be-queried-scm-105",
description="This rule is created purely to test the data source functionality.",
position="pre",
folder="All",
destinations=["any"],
froms=["any"],
tos=["any"],
sources=["any"],
services=[
"service-http",
"service-https",
],
source_users=["any"],
timeout=1200,
negate_source=False,
negate_destination=False)
rule_data = scm.get_authentication_rule_output(id=rule_to_fetch.id)
pulumi.export("fetchedRuleId", rule_data.id)
pulumi.export("fetchedRuleTimeout", rule_data.timeout)
package main
import (
"github.com/pulumi/pulumi-scm/sdk/go/scm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
ruleToFetch, err := scm.NewAuthenticationRule(ctx, "rule_to_fetch", &scm.AuthenticationRuleArgs{
Name: pulumi.String("rule-to-be-queried-scm-105"),
Description: pulumi.String("This rule is created purely to test the data source functionality."),
Position: pulumi.String("pre"),
Folder: pulumi.String("All"),
Destinations: pulumi.StringArray{
pulumi.String("any"),
},
Froms: pulumi.StringArray{
pulumi.String("any"),
},
Tos: pulumi.StringArray{
pulumi.String("any"),
},
Sources: pulumi.StringArray{
pulumi.String("any"),
},
Services: pulumi.StringArray{
pulumi.String("service-http"),
pulumi.String("service-https"),
},
SourceUsers: pulumi.StringArray{
pulumi.String("any"),
},
Timeout: pulumi.Int(1200),
NegateSource: pulumi.Bool(false),
NegateDestination: pulumi.Bool(false),
})
if err != nil {
return err
}
ruleData := scm.LookupAuthenticationRuleOutput(ctx, scm.GetAuthenticationRuleOutputArgs{
Id: ruleToFetch.ID(),
}, nil)
ctx.Export("fetchedRuleId", ruleData.ApplyT(func(ruleData scm.GetAuthenticationRuleResult) (*string, error) {
return &ruleData.Id, nil
}).(pulumi.StringPtrOutput))
ctx.Export("fetchedRuleTimeout", ruleData.ApplyT(func(ruleData scm.GetAuthenticationRuleResult) (*int, error) {
return &ruleData.Timeout, nil
}).(pulumi.IntPtrOutput))
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Scm = Pulumi.Scm;
return await Deployment.RunAsync(() =>
{
var ruleToFetch = new Scm.AuthenticationRule("rule_to_fetch", new()
{
Name = "rule-to-be-queried-scm-105",
Description = "This rule is created purely to test the data source functionality.",
Position = "pre",
Folder = "All",
Destinations = new[]
{
"any",
},
Froms = new[]
{
"any",
},
Tos = new[]
{
"any",
},
Sources = new[]
{
"any",
},
Services = new[]
{
"service-http",
"service-https",
},
SourceUsers = new[]
{
"any",
},
Timeout = 1200,
NegateSource = false,
NegateDestination = false,
});
var ruleData = Scm.GetAuthenticationRule.Invoke(new()
{
Id = ruleToFetch.Id,
});
return new Dictionary<string, object?>
{
["fetchedRuleId"] = ruleData.Apply(getAuthenticationRuleResult => getAuthenticationRuleResult.Id),
["fetchedRuleTimeout"] = ruleData.Apply(getAuthenticationRuleResult => getAuthenticationRuleResult.Timeout),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.scm.AuthenticationRule;
import com.pulumi.scm.AuthenticationRuleArgs;
import com.pulumi.scm.ScmFunctions;
import com.pulumi.scm.inputs.GetAuthenticationRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var ruleToFetch = new AuthenticationRule("ruleToFetch", AuthenticationRuleArgs.builder()
.name("rule-to-be-queried-scm-105")
.description("This rule is created purely to test the data source functionality.")
.position("pre")
.folder("All")
.destinations("any")
.froms("any")
.tos("any")
.sources("any")
.services(
"service-http",
"service-https")
.sourceUsers("any")
.timeout(1200)
.negateSource(false)
.negateDestination(false)
.build());
final var ruleData = ScmFunctions.getAuthenticationRule(GetAuthenticationRuleArgs.builder()
.id(ruleToFetch.id())
.build());
ctx.export("fetchedRuleId", ruleData.applyValue(_ruleData -> _ruleData.id()));
ctx.export("fetchedRuleTimeout", ruleData.applyValue(_ruleData -> _ruleData.timeout()));
}
}
resources:
ruleToFetch:
type: scm:AuthenticationRule
name: rule_to_fetch
properties:
name: rule-to-be-queried-scm-105
description: This rule is created purely to test the data source functionality.
position: pre
folder: All
destinations:
- any
froms:
- any
tos:
- any
sources:
- any
services:
- service-http
- service-https
sourceUsers:
- any
timeout: 1200
negateSource: false
negateDestination: false
variables:
ruleData:
fn::invoke:
function: scm:getAuthenticationRule
arguments:
id: ${ruleToFetch.id}
outputs:
fetchedRuleId: ${ruleData.id}
fetchedRuleTimeout: ${ruleData.timeout}
Using getAuthenticationRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getAuthenticationRule(args: GetAuthenticationRuleArgs, opts?: InvokeOptions): Promise<GetAuthenticationRuleResult>
function getAuthenticationRuleOutput(args: GetAuthenticationRuleOutputArgs, opts?: InvokeOptions): Output<GetAuthenticationRuleResult>def get_authentication_rule(id: Optional[str] = None,
name: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetAuthenticationRuleResult
def get_authentication_rule_output(id: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetAuthenticationRuleResult]func LookupAuthenticationRule(ctx *Context, args *LookupAuthenticationRuleArgs, opts ...InvokeOption) (*LookupAuthenticationRuleResult, error)
func LookupAuthenticationRuleOutput(ctx *Context, args *LookupAuthenticationRuleOutputArgs, opts ...InvokeOption) LookupAuthenticationRuleResultOutput> Note: This function is named LookupAuthenticationRule in the Go SDK.
public static class GetAuthenticationRule
{
public static Task<GetAuthenticationRuleResult> InvokeAsync(GetAuthenticationRuleArgs args, InvokeOptions? opts = null)
public static Output<GetAuthenticationRuleResult> Invoke(GetAuthenticationRuleInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetAuthenticationRuleResult> getAuthenticationRule(GetAuthenticationRuleArgs args, InvokeOptions options)
public static Output<GetAuthenticationRuleResult> getAuthenticationRule(GetAuthenticationRuleArgs args, InvokeOptions options)
fn::invoke:
function: scm:index/getAuthenticationRule:getAuthenticationRule
arguments:
# arguments dictionaryThe following arguments are supported:
getAuthenticationRule Result
The following output properties are available:
- Authentication
Enforcement string - The authentication profile name
- Categories List<string>
- The destination URL categories
- Description string
- The description of the authentication rule
- Destination
Hips List<string> - The destination Host Integrity Profile (HIP)
- Destinations List<string>
- The destination addresses
- Device string
- Device
- Disabled bool
- Is the authentication rule disabled?
- Folder string
- Folder
- Froms List<string>
- The source security zones
- Group
Tag string - Group tag
- Hip
Profiles List<string> - The source Host Integrity Profile (HIP)
- Id string
- The UUID of the authentication rule
- Log
Authentication boolTimeout - Log authentication timeouts?
- Log
Setting string - The log forwarding profile name
- Name string
- The name of the authentication rule
- Negate
Destination bool - Are the destination addresses negated?
- Negate
Source bool - Are the source addresses negated?
- Position string
- The relative position of the rule
- Relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - Services List<string>
- The destination ports
- Snippet string
- Snippet
- Source
Hips List<string> - The source Host Integrity Profile (HIP)
- Source
Users List<string> - The source users
- Sources List<string>
- The source addresses
- List<string>
- The authentication rule tags
- Target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - Tfid string
- Timeout int
- The authentication session timeout (seconds)
- Tos List<string>
- The destination security zones
- Authentication
Enforcement string - The authentication profile name
- Categories []string
- The destination URL categories
- Description string
- The description of the authentication rule
- Destination
Hips []string - The destination Host Integrity Profile (HIP)
- Destinations []string
- The destination addresses
- Device string
- Device
- Disabled bool
- Is the authentication rule disabled?
- Folder string
- Folder
- Froms []string
- The source security zones
- Group
Tag string - Group tag
- Hip
Profiles []string - The source Host Integrity Profile (HIP)
- Id string
- The UUID of the authentication rule
- Log
Authentication boolTimeout - Log authentication timeouts?
- Log
Setting string - The log forwarding profile name
- Name string
- The name of the authentication rule
- Negate
Destination bool - Are the destination addresses negated?
- Negate
Source bool - Are the source addresses negated?
- Position string
- The relative position of the rule
- Relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - Services []string
- The destination ports
- Snippet string
- Snippet
- Source
Hips []string - The source Host Integrity Profile (HIP)
- Source
Users []string - The source users
- Sources []string
- The source addresses
- []string
- The authentication rule tags
- Target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - Tfid string
- Timeout int
- The authentication session timeout (seconds)
- Tos []string
- The destination security zones
- authentication
Enforcement String - The authentication profile name
- categories List<String>
- The destination URL categories
- description String
- The description of the authentication rule
- destination
Hips List<String> - The destination Host Integrity Profile (HIP)
- destinations List<String>
- The destination addresses
- device String
- Device
- disabled Boolean
- Is the authentication rule disabled?
- folder String
- Folder
- froms List<String>
- The source security zones
- group
Tag String - Group tag
- hip
Profiles List<String> - The source Host Integrity Profile (HIP)
- id String
- The UUID of the authentication rule
- log
Authentication BooleanTimeout - Log authentication timeouts?
- log
Setting String - The log forwarding profile name
- name String
- The name of the authentication rule
- negate
Destination Boolean - Are the destination addresses negated?
- negate
Source Boolean - Are the source addresses negated?
- position String
- The relative position of the rule
- relative
Position String - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - services List<String>
- The destination ports
- snippet String
- Snippet
- source
Hips List<String> - The source Host Integrity Profile (HIP)
- source
Users List<String> - The source users
- sources List<String>
- The source addresses
- List<String>
- The authentication rule tags
- target
Rule String - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tfid String
- timeout Integer
- The authentication session timeout (seconds)
- tos List<String>
- The destination security zones
- authentication
Enforcement string - The authentication profile name
- categories string[]
- The destination URL categories
- description string
- The description of the authentication rule
- destination
Hips string[] - The destination Host Integrity Profile (HIP)
- destinations string[]
- The destination addresses
- device string
- Device
- disabled boolean
- Is the authentication rule disabled?
- folder string
- Folder
- froms string[]
- The source security zones
- group
Tag string - Group tag
- hip
Profiles string[] - The source Host Integrity Profile (HIP)
- id string
- The UUID of the authentication rule
- log
Authentication booleanTimeout - Log authentication timeouts?
- log
Setting string - The log forwarding profile name
- name string
- The name of the authentication rule
- negate
Destination boolean - Are the destination addresses negated?
- negate
Source boolean - Are the source addresses negated?
- position string
- The relative position of the rule
- relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - services string[]
- The destination ports
- snippet string
- Snippet
- source
Hips string[] - The source Host Integrity Profile (HIP)
- source
Users string[] - The source users
- sources string[]
- The source addresses
- string[]
- The authentication rule tags
- target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tfid string
- timeout number
- The authentication session timeout (seconds)
- tos string[]
- The destination security zones
- authentication_
enforcement str - The authentication profile name
- categories Sequence[str]
- The destination URL categories
- description str
- The description of the authentication rule
- destination_
hips Sequence[str] - The destination Host Integrity Profile (HIP)
- destinations Sequence[str]
- The destination addresses
- device str
- Device
- disabled bool
- Is the authentication rule disabled?
- folder str
- Folder
- froms Sequence[str]
- The source security zones
- group_
tag str - Group tag
- hip_
profiles Sequence[str] - The source Host Integrity Profile (HIP)
- id str
- The UUID of the authentication rule
- log_
authentication_ booltimeout - Log authentication timeouts?
- log_
setting str - The log forwarding profile name
- name str
- The name of the authentication rule
- negate_
destination bool - Are the destination addresses negated?
- negate_
source bool - Are the source addresses negated?
- position str
- The relative position of the rule
- relative_
position str - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - services Sequence[str]
- The destination ports
- snippet str
- Snippet
- source_
hips Sequence[str] - The source Host Integrity Profile (HIP)
- source_
users Sequence[str] - The source users
- sources Sequence[str]
- The source addresses
- Sequence[str]
- The authentication rule tags
- target_
rule str - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tfid str
- timeout int
- The authentication session timeout (seconds)
- tos Sequence[str]
- The destination security zones
- authentication
Enforcement String - The authentication profile name
- categories List<String>
- The destination URL categories
- description String
- The description of the authentication rule
- destination
Hips List<String> - The destination Host Integrity Profile (HIP)
- destinations List<String>
- The destination addresses
- device String
- Device
- disabled Boolean
- Is the authentication rule disabled?
- folder String
- Folder
- froms List<String>
- The source security zones
- group
Tag String - Group tag
- hip
Profiles List<String> - The source Host Integrity Profile (HIP)
- id String
- The UUID of the authentication rule
- log
Authentication BooleanTimeout - Log authentication timeouts?
- log
Setting String - The log forwarding profile name
- name String
- The name of the authentication rule
- negate
Destination Boolean - Are the destination addresses negated?
- negate
Source Boolean - Are the source addresses negated?
- position String
- The relative position of the rule
- relative
Position String - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - services List<String>
- The destination ports
- snippet String
- Snippet
- source
Hips List<String> - The source Host Integrity Profile (HIP)
- source
Users List<String> - The source users
- sources List<String>
- The source addresses
- List<String>
- The authentication rule tags
- target
Rule String - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tfid String
- timeout Number
- The authentication session timeout (seconds)
- tos List<String>
- The destination security zones
Package Details
- Repository
- scm pulumi/pulumi-scm
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
scmTerraform Provider.
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
