List Scan Inventory objects.
OAuth 2.0 client credential flow, see https://datatracker.ietf.org/doc/html/rfc6749#section-4.4.
Success result
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
The region this volume will be available
The arn of the key in KMS that encrypts this drive
The ARN of the volume
The storage limit (in GB) of the volume
Enumeration of the states that a volume may occupy.
This enum will default to the Other variant when a new variant is
found as the SDK from AWS marks their enum as "non-exhaustive"
Enumeration of the various types of volumes supported.
This enum will default to the Other variant when a new variant is
found as the SDK from AWS marks their enum as "non-exhaustive"
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
Specifier for optional CMK Keys.
If true, encryption is in place either with a CMK (customer managed key) or MMK (microsoft managed key).
The service tiers for SQL Single Server.
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
Specifier for optional CMK Keys.
If true, encryption is in place either with a CMK (customer managed key) or MMK (microsoft managed key).
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
Specifier for optional CMK Keys.
If true, encryption is in place either with a CMK (customer managed key) or MMK (microsoft managed key).
The API a Cosmos databases exposes to applications. Some possible values currently available in Azure are "Sql", "MongoDB", "Cassandra", ... This may be directly exposed in the frontend.
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
Specifier for optional CMK Keys.
If true, encryption is in place either with a CMK (customer managed key) or MMK (microsoft managed key).
Represents if the crypto policy is compliant for the key.
Represents the violation reason if the non-compliant against the
crypto policy, otherwise None.
Defaults to false. Will be true only if underlying key is used
to encrypt multiple services.
True if this is the latest key version, False otherwise.
True if the key version's lifetime is managed by key vault, False otherwise.
The timestamp when the key will be activated. None, if the activation date is not set for the key.
The timestamp of creation of the key.
The timestamp when the key will expire. None, if the expiry date is not scheduled for the key.
Represents true if the key is enabled, false otherwise.
Represents true if the key is exportable, false otherwise.
Soft Delete data retention days. Value should be >=7 and <=90 when soft delete is enabled, otherwise 0.
The timestamp when the key was last updated. By default, it will always have the key creation timestamp as the last updated time.
The name associated with the key version.
Allowed key operations on the key version.
Returns the date when the key will be rotated. None, when the auto key rotation is not enabled for the key.
Represents the Azure Key Vault Name.
Represents the Azure key vault URI.
The key version of the scanned key.
The tags associated with the key version.
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
The encryption key source (provider).
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
Used to represent state of [AzureManagedDisk]. for reference: Documentation
Used to represent SKU of [AzureManagedDisk]. For reference: Documentation
Used to describe Server-side encryption configuration of [AzureManagedDisks]
- This does not cover Azure Disk Encryption which is handled on a volume level on VM
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
This enum will be used for denoting key availability for all services in all cloud providers. Each variant corresponds to different states of key used to encrypt the service. If a service is not encrypted, the key will me marked as Unknown
The encryption key source (provider).
Certificate's issuer generated from [DistinguishedNameto_string()]
/ parseable by [DistinguishedNamefrom_str()]
Certificate Distinguished Name (DN) mandated + optional fields,
as defined in RFC 5280 §4.1.2.4 - used for both issuer and subject.
ASN.1 in the same RFC allows zero or more values for each of these fields.
To present it nicely in a UI:
- Primary label: first
common_name(CN). - Fallback: first
organization_name(O). - Optional detail: append
organizational_unit_name(OU),country_name(C), ordomain_component(DC) as needed.
The string is presented as a serialized json from distinguished name map indexed by the short labels (uppercase) for each sub-field.
Certificate's subject generated from [DistinguishedNameto_string()]
/ parseable by [DistinguishedNamefrom_str()]
Certificate Distinguished Name (DN) mandated + optional fields,
as defined in RFC 5280 §4.1.2.4 - used for both issuer and subject.
ASN.1 in the same RFC allows zero or more values for each of these fields.
To present it nicely in a UI:
- Primary label: first
common_name(CN). - Fallback: first
organization_name(O). - Optional detail: append
organizational_unit_name(OU),country_name(C), ordomain_component(DC) as needed.
The string is presented as a serialized json from distinguished name map indexed by the short labels (uppercase) for each sub-field.
“Other” users on POSIX; on Windows, “Everyone” ACL entry
What the owner can do with the file
User or Group id -- String to allow representing both POSIX & Windows IDs
User or Group name
What the owner can do with the file
User or Group id -- String to allow representing both POSIX & Windows IDs
User or Group name
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
This is used if a single file contains multiple crytpogrpahic materials within it. This primarily applies to PEM files, as multiple PEM blocks can be concatenated together without issue.
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
This is used if a single file contains multiple crytpogrpahic materials within it. This primarily applies to PEM files, as multiple PEM blocks can be concatenated together without issue.
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
This is used if a single file contains multiple crytpogrpahic materials within it. This primarily applies to PEM files, as multiple PEM blocks can be concatenated together without issue.
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
This is used if a single file contains multiple crytpogrpahic materials within it. This primarily applies to PEM files, as multiple PEM blocks can be concatenated together without issue.
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
This is used if a single file contains multiple crytpogrpahic materials within it. This primarily applies to PEM files, as multiple PEM blocks can be concatenated together without issue.
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Unknown value, will contain the OID that was found
Unknown value, will contain the OID that was found
Comes from openssl_x509_name_to_map()
Comes from openssl_x509_name_to_map()
Elliptic curves for selected crypto algorithms
A catch-all if you really need to accept arbitrary curve names
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Describes whether the cryptographic material is wrapped in a symmetric key -- requiring a passphrase
Operations Allowed To Be Performed On A Given Key.
The origin of a security object - where it was created / generated.
DSM Security object operational state.
KI account extension id
KI account's connection id
an enum that maps to unique identifier provided by Cloud/Onprem
fully qualified resource id as defined by AWS
fully qualified resource id as defined by Azure
Useful for specifying [InventoryObjectExternalId]s
unique id
Db/filesystem uri which yielded this resource
KI group extension id
generated by KI. remains static throughout lifetime of account