import * as mod from "https://aws-api-bqtgftz736ft.deno.dev/v0.5/services/pcaconnectorad.ts?docs=full";| PcaConnectorAd |
| AccessControlEntry | An access control entry allows or denies Active Directory groups based on their security identifiers (SIDs) from enrolling and/or autoenrolling with the template. |
| AccessControlEntrySummary | Summary of group access control entries that allow or deny Active Directory groups based on their security identifiers (SIDs) from enrolling and/or autofenrolling with the template. |
| AccessRights | Allow or deny permissions for an Active Directory group to enroll or autoenroll certificates for a template. |
| ApplicationPolicies | Application policies describe what the certificate can be used for. |
| ApplicationPolicy | Application policies describe what the certificate can be used for. |
| CertificateValidity | Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate. Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280. This value is unaffected when ValidityNotBefore is also specified. For example, if Validity is set to 20 days in the future, the certificate will expire 20 days from issuance time regardless of the ValidityNotBefore value. |
| Connector | Amazon Web Services Private CA Connector for Active Directory is a service that links your Active Directory with Amazon Web Services Private CA. The connector brokers the exchange of certificates from Amazon Web Services Private CA to domain-joined users and machines managed with Active Directory. |
| ConnectorSummary | Summary description of the Amazon Web Services Private CA AD connectors belonging to an Amazon Web Services account. |
| CreateConnectorRequest | |
| CreateConnectorResponse | |
| CreateDirectoryRegistrationRequest | |
| CreateDirectoryRegistrationResponse | |
| CreateServicePrincipalNameRequest | |
| CreateTemplateGroupAccessControlEntryRequest | |
| CreateTemplateRequest | |
| CreateTemplateResponse | |
| DeleteConnectorRequest | |
| DeleteDirectoryRegistrationRequest | |
| DeleteServicePrincipalNameRequest | |
| DeleteTemplateGroupAccessControlEntryRequest | |
| DeleteTemplateRequest | |
| DirectoryRegistration | The directory registration represents the authorization of the connector service with a directory. |
| DirectoryRegistrationSummary | The directory registration represents the authorization of the connector service with the Active Directory. |
| EnrollmentFlagsV2 | Template configurations for v2 template schema. |
| EnrollmentFlagsV3 | Template configurations for v3 template schema. |
| EnrollmentFlagsV4 | Template configurations for v4 template schema. |
| ExtensionsV2 | Certificate extensions for v2 template schema |
| ExtensionsV3 | Certificate extensions for v3 template schema |
| ExtensionsV4 | Certificate extensions for v4 template schema |
| GeneralFlagsV2 | General flags for v2 template schema that defines if the template is for a machine or a user and if the template can be issued using autoenrollment. |
| GeneralFlagsV3 | General flags for v3 template schema that defines if the template is for a machine or a user and if the template can be issued using autoenrollment. |
| GeneralFlagsV4 | General flags for v4 template schema that defines if the template is for a machine or a user and if the template can be issued using autoenrollment. |
| GetConnectorRequest | |
| GetConnectorResponse | |
| GetDirectoryRegistrationRequest | |
| GetDirectoryRegistrationResponse | |
| GetServicePrincipalNameRequest | |
| GetServicePrincipalNameResponse | |
| GetTemplateGroupAccessControlEntryRequest | |
| GetTemplateGroupAccessControlEntryResponse | |
| GetTemplateRequest | |
| GetTemplateResponse | |
| KeyUsage | The key usage extension defines the purpose (e.g., encipherment, signature) of the key contained in the certificate. |
| KeyUsageFlags | The key usage flags represent the purpose (e.g., encipherment, signature) of the key contained in the certificate. |
| KeyUsageProperty | The key usage property defines the purpose of the private key contained in the certificate. You can specify specific purposes using property flags or all by using property type ALL. |
| KeyUsagePropertyFlags | Specifies key usage. |
| ListConnectorsRequest | |
| ListConnectorsResponse | |
| ListDirectoryRegistrationsRequest | |
| ListDirectoryRegistrationsResponse | |
| ListServicePrincipalNamesRequest | |
| ListServicePrincipalNamesResponse | |
| ListTagsForResourceRequest | |
| ListTagsForResourceResponse | |
| ListTemplateGroupAccessControlEntriesRequest | |
| ListTemplateGroupAccessControlEntriesResponse | |
| ListTemplatesRequest | |
| ListTemplatesResponse | |
| PrivateKeyAttributesV2 | Defines the attributes of the private key. |
| PrivateKeyAttributesV3 | Defines the attributes of the private key. |
| PrivateKeyAttributesV4 | Defines the attributes of the private key. |
| PrivateKeyFlagsV2 | Private key flags for v2 templates specify the client compatibility, if the private key can be exported, and if user input is required when using a private key. |
| PrivateKeyFlagsV3 | Private key flags for v3 templates specify the client compatibility, if the private key can be exported, if user input is required when using a private key, and if an alternate signature algorithm should be used. |
| PrivateKeyFlagsV4 | Private key flags for v4 templates specify the client compatibility, if the private key can be exported, if user input is required when using a private key, if an alternate signature algorithm should be used, and if certificates are renewed using the same private key. |
| ServicePrincipalName | The service principal name that the connector uses to authenticate with Active Directory. |
| ServicePrincipalNameSummary | The service principal name that the connector uses to authenticate with Active Directory. |
| SubjectNameFlagsV2 | Information to include in the subject name and alternate subject name of the certificate. The subject name can be common name, directory path, DNS as common name, or left blank. You can optionally include email to the subject name for user templates. If you leave the subject name blank then you must set a subject alternate name. The subject alternate name (SAN) can include globally unique identifier (GUID), DNS, domain DNS, email, service principal name (SPN), and user principal name (UPN). You can leave the SAN blank. If you leave the SAN blank, then you must set a subject name. |
| SubjectNameFlagsV3 | Information to include in the subject name and alternate subject name of the certificate. The subject name can be common name, directory path, DNS as common name, or left blank. You can optionally include email to the subject name for user templates. If you leave the subject name blank then you must set a subject alternate name. The subject alternate name (SAN) can include globally unique identifier (GUID), DNS, domain DNS, email, service principal name (SPN), and user principal name (UPN). You can leave the SAN blank. If you leave the SAN blank, then you must set a subject name. |
| SubjectNameFlagsV4 | Information to include in the subject name and alternate subject name of the certificate. The subject name can be common name, directory path, DNS as common name, or left blank. You can optionally include email to the subject name for user templates. If you leave the subject name blank then you must set a subject alternate name. The subject alternate name (SAN) can include globally unique identifier (GUID), DNS, domain DNS, email, service principal name (SPN), and user principal name (UPN). You can leave the SAN blank. If you leave the SAN blank, then you must set a subject name. |
| TagResourceRequest | |
| Template | An Active Directory compatible certificate template. Connectors issue certificates against these templates based on the requestor's Active Directory group membership. |
| TemplateDefinition | Template configuration to define the information included in certificates. Define certificate validity and renewal periods, certificate request handling and enrollment options, key usage extensions, application policies, and cryptography settings. |
| TemplateRevision | The revision version of the template. Template updates will increment the minor revision. Re-enrolling all certificate holders will increment the major revision. |
| TemplateSummary | An Active Directory compatible certificate template. Connectors issue certificates against these templates based on the requestor's Active Directory group membership. |
| TemplateV2 | v2 template schema that uses Legacy Cryptographic Providers. |
| TemplateV3 | v3 template schema that uses Key Storage Providers. |
| TemplateV4 | v4 template schema that can use either Legacy Cryptographic Providers or Key Storage Providers. |
| UntagResourceRequest | |
| UpdateTemplateGroupAccessControlEntryRequest | |
| UpdateTemplateRequest | |
| ValidityPeriod | Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate. Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in hours, days, months, or years. For more information, see Validity in RFC 5280. This value is unaffected when ValidityNotBefore is also specified. For example, if Validity is set to 20 days in the future, the certificate will expire 20 days from issuance time regardless of the ValidityNotBefore value. |
| VpcInformation | Information about your VPC and security groups used with the connector. |