Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
scm.getSecurityRule
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
SecurityRule data source
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as scm from "@pulumi/scm";
const standardWebAccess = new scm.SecurityRule("standard_web_access", {
folder: "All",
name: "Allow Standard Web Access DS1",
description: "Allow outbound web traffic to any destination...",
position: "pre",
action: "allow",
categories: ["any"],
applications: [
"web-browsing",
"ssl",
],
services: [
"service-http",
"service-https",
],
froms: [
"untrust",
"trust",
],
tos: ["trust"],
sources: ["any"],
destinations: ["any"],
negateSource: false,
negateDestination: false,
sourceUsers: ["any"],
sourceHips: ["any"],
destinationHips: ["any"],
logStart: true,
logEnd: true,
disabled: false,
});
// --- Data Source Calls to Fetch Existing Rules ---
// 1. Fetch by ID (Best for direct lookup)
const standardWebAccessById = scm.getSecurityRuleOutput({
id: standardWebAccess.id,
});
export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
import pulumi
import pulumi_scm as scm
standard_web_access = scm.SecurityRule("standard_web_access",
folder="All",
name="Allow Standard Web Access DS1",
description="Allow outbound web traffic to any destination...",
position="pre",
action="allow",
categories=["any"],
applications=[
"web-browsing",
"ssl",
],
services=[
"service-http",
"service-https",
],
froms=[
"untrust",
"trust",
],
tos=["trust"],
sources=["any"],
destinations=["any"],
negate_source=False,
negate_destination=False,
source_users=["any"],
source_hips=["any"],
destination_hips=["any"],
log_start=True,
log_end=True,
disabled=False)
# --- Data Source Calls to Fetch Existing Rules ---
# 1. Fetch by ID (Best for direct lookup)
standard_web_access_by_id = scm.get_security_rule_output(id=standard_web_access.id)
pulumi.export("fetchedStandardWebId", standard_web_access_by_id.id)
pulumi.export("fetchedStandardWebName", standard_web_access_by_id.name)
pulumi.export("fetchedStandardWebDescription", standard_web_access_by_id.description)
package main
import (
"github.com/pulumi/pulumi-scm/sdk/go/scm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
standardWebAccess, err := scm.NewSecurityRule(ctx, "standard_web_access", &scm.SecurityRuleArgs{
Folder: pulumi.String("All"),
Name: pulumi.String("Allow Standard Web Access DS1"),
Description: pulumi.String("Allow outbound web traffic to any destination..."),
Position: pulumi.String("pre"),
Action: pulumi.String("allow"),
Categories: pulumi.StringArray{
pulumi.String("any"),
},
Applications: pulumi.StringArray{
pulumi.String("web-browsing"),
pulumi.String("ssl"),
},
Services: pulumi.StringArray{
pulumi.String("service-http"),
pulumi.String("service-https"),
},
Froms: pulumi.StringArray{
pulumi.String("untrust"),
pulumi.String("trust"),
},
Tos: pulumi.StringArray{
pulumi.String("trust"),
},
Sources: pulumi.StringArray{
pulumi.String("any"),
},
Destinations: pulumi.StringArray{
pulumi.String("any"),
},
NegateSource: pulumi.Bool(false),
NegateDestination: pulumi.Bool(false),
SourceUsers: pulumi.StringArray{
pulumi.String("any"),
},
SourceHips: pulumi.StringArray{
pulumi.String("any"),
},
DestinationHips: pulumi.StringArray{
pulumi.String("any"),
},
LogStart: pulumi.Bool(true),
LogEnd: pulumi.Bool(true),
Disabled: pulumi.Bool(false),
})
if err != nil {
return err
}
// 1. Fetch by ID (Best for direct lookup)
standardWebAccessById := scm.LookupSecurityRuleOutput(ctx, scm.GetSecurityRuleOutputArgs{
Id: standardWebAccess.ID(),
}, nil)
ctx.Export("fetchedStandardWebId", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
return &standardWebAccessById.Id, nil
}).(pulumi.StringPtrOutput))
ctx.Export("fetchedStandardWebName", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
return &standardWebAccessById.Name, nil
}).(pulumi.StringPtrOutput))
ctx.Export("fetchedStandardWebDescription", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
return &standardWebAccessById.Description, nil
}).(pulumi.StringPtrOutput))
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Scm = Pulumi.Scm;
return await Deployment.RunAsync(() =>
{
var standardWebAccess = new Scm.SecurityRule("standard_web_access", new()
{
Folder = "All",
Name = "Allow Standard Web Access DS1",
Description = "Allow outbound web traffic to any destination...",
Position = "pre",
Action = "allow",
Categories = new[]
{
"any",
},
Applications = new[]
{
"web-browsing",
"ssl",
},
Services = new[]
{
"service-http",
"service-https",
},
Froms = new[]
{
"untrust",
"trust",
},
Tos = new[]
{
"trust",
},
Sources = new[]
{
"any",
},
Destinations = new[]
{
"any",
},
NegateSource = false,
NegateDestination = false,
SourceUsers = new[]
{
"any",
},
SourceHips = new[]
{
"any",
},
DestinationHips = new[]
{
"any",
},
LogStart = true,
LogEnd = true,
Disabled = false,
});
// --- Data Source Calls to Fetch Existing Rules ---
// 1. Fetch by ID (Best for direct lookup)
var standardWebAccessById = Scm.GetSecurityRule.Invoke(new()
{
Id = standardWebAccess.Id,
});
return new Dictionary<string, object?>
{
["fetchedStandardWebId"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Id),
["fetchedStandardWebName"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Name),
["fetchedStandardWebDescription"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Description),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.scm.SecurityRule;
import com.pulumi.scm.SecurityRuleArgs;
import com.pulumi.scm.ScmFunctions;
import com.pulumi.scm.inputs.GetSecurityRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var standardWebAccess = new SecurityRule("standardWebAccess", SecurityRuleArgs.builder()
.folder("All")
.name("Allow Standard Web Access DS1")
.description("Allow outbound web traffic to any destination...")
.position("pre")
.action("allow")
.categories("any")
.applications(
"web-browsing",
"ssl")
.services(
"service-http",
"service-https")
.froms(
"untrust",
"trust")
.tos("trust")
.sources("any")
.destinations("any")
.negateSource(false)
.negateDestination(false)
.sourceUsers("any")
.sourceHips("any")
.destinationHips("any")
.logStart(true)
.logEnd(true)
.disabled(false)
.build());
// --- Data Source Calls to Fetch Existing Rules ---
// 1. Fetch by ID (Best for direct lookup)
final var standardWebAccessById = ScmFunctions.getSecurityRule(GetSecurityRuleArgs.builder()
.id(standardWebAccess.id())
.build());
ctx.export("fetchedStandardWebId", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.id()));
ctx.export("fetchedStandardWebName", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.name()));
ctx.export("fetchedStandardWebDescription", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.description()));
}
}
resources:
standardWebAccess: # --- Data Source Calls to Fetch Existing Rules ---
type: scm:SecurityRule
name: standard_web_access
properties:
folder: All
name: Allow Standard Web Access DS1
description: Allow outbound web traffic to any destination...
position: pre
action: allow
categories:
- any
applications:
- web-browsing
- ssl
services:
- service-http
- service-https
froms:
- untrust
- trust
tos:
- trust
sources:
- any
destinations:
- any
negateSource: false
negateDestination: false # Identity & Content
sourceUsers: #
- any
sourceHips: # Security-only
- any
destinationHips: # Security-only
- any
logStart: true # Security-only
logEnd: true # Optional fields
disabled: false
variables:
# 1. Fetch by ID (Best for direct lookup)
standardWebAccessById:
fn::invoke:
function: scm:getSecurityRule
arguments:
id: ${standardWebAccess.id}
outputs:
# --- Outputs to Verify Fetched Data ---
fetchedStandardWebId: ${standardWebAccessById.id}
fetchedStandardWebName: ${standardWebAccessById.name}
fetchedStandardWebDescription: ${standardWebAccessById.description}
Using getSecurityRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSecurityRule(args: GetSecurityRuleArgs, opts?: InvokeOptions): Promise<GetSecurityRuleResult>
function getSecurityRuleOutput(args: GetSecurityRuleOutputArgs, opts?: InvokeOptions): Output<GetSecurityRuleResult>def get_security_rule(id: Optional[str] = None,
name: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSecurityRuleResult
def get_security_rule_output(id: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSecurityRuleResult]func LookupSecurityRule(ctx *Context, args *LookupSecurityRuleArgs, opts ...InvokeOption) (*LookupSecurityRuleResult, error)
func LookupSecurityRuleOutput(ctx *Context, args *LookupSecurityRuleOutputArgs, opts ...InvokeOption) LookupSecurityRuleResultOutput> Note: This function is named LookupSecurityRule in the Go SDK.
public static class GetSecurityRule
{
public static Task<GetSecurityRuleResult> InvokeAsync(GetSecurityRuleArgs args, InvokeOptions? opts = null)
public static Output<GetSecurityRuleResult> Invoke(GetSecurityRuleInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetSecurityRuleResult> getSecurityRule(GetSecurityRuleArgs args, InvokeOptions options)
public static Output<GetSecurityRuleResult> getSecurityRule(GetSecurityRuleArgs args, InvokeOptions options)
fn::invoke:
function: scm:index/getSecurityRule:getSecurityRule
arguments:
# arguments dictionaryThe following arguments are supported:
getSecurityRule Result
The following output properties are available:
- Action string
- The action to be taken when the rule is matched
- Allow
Url List<GetCategories Security Rule Allow Url Category> - Allow url category
- Allow
Web List<GetApplications Security Rule Allow Web Application> - Allow web application
- Applications List<string>
- The application(s) being accessed
- Block
Url List<string>Categories - Block url category
- Block
Web List<string>Applications - Block web application
- Categories List<string>
- The URL categories being accessed
- Default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- Description string
- The description of the security rule
- Destination
Hips List<string> - The destination Host Integrity Profile(s)
- Destinations List<string>
- The destination address(es)
- Device string
- The device in which the resource is defined
- Devices List<string>
- Devices
- Disabled bool
- Is the security rule disabled?
- Folder string
- The folder in which the resource is defined
- Froms List<string>
- The source security zone(s)
- Id string
- The UUID of the security rule
- Log
End bool - Log at session end?
- Log
Setting string - The external log forwarding profile
- Log
Settings GetSecurity Rule Log Settings - Log settings
- Log
Start bool - Log at session start?
- Name string
- The name of the security rule
- Negate
Destination bool - Negate the destination addresses(es)?
- Negate
Source bool - Negate the source address(es)?
- Negate
User bool - Negate user
- Policy
Type string - Policy type
- Position string
- The position of a security rule
- Profile
Setting GetSecurity Rule Profile Setting - The security profile object
- Relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - Schedule string
- Schedule in which this rule will be applied
- Security
Settings GetSecurity Rule Security Settings - Security settings
- Services List<string>
- The service(s) being accessed
- Snippet string
- The snippet in which the resource is defined
- Source
Hips List<string> - The source Host Integrity Profile(s)
- Source
Users List<string> - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - Sources List<string>
- The source addresses(es)
- List<string>
- The tags associated with the security rule
- Target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - Tenant
Restrictions List<string> - Tenant restrictions
- Tfid string
- Tos List<string>
- The destination security zone(s)
- Action string
- The action to be taken when the rule is matched
- Allow
Url []GetCategories Security Rule Allow Url Category - Allow url category
- Allow
Web []GetApplications Security Rule Allow Web Application - Allow web application
- Applications []string
- The application(s) being accessed
- Block
Url []stringCategories - Block url category
- Block
Web []stringApplications - Block web application
- Categories []string
- The URL categories being accessed
- Default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- Description string
- The description of the security rule
- Destination
Hips []string - The destination Host Integrity Profile(s)
- Destinations []string
- The destination address(es)
- Device string
- The device in which the resource is defined
- Devices []string
- Devices
- Disabled bool
- Is the security rule disabled?
- Folder string
- The folder in which the resource is defined
- Froms []string
- The source security zone(s)
- Id string
- The UUID of the security rule
- Log
End bool - Log at session end?
- Log
Setting string - The external log forwarding profile
- Log
Settings GetSecurity Rule Log Settings - Log settings
- Log
Start bool - Log at session start?
- Name string
- The name of the security rule
- Negate
Destination bool - Negate the destination addresses(es)?
- Negate
Source bool - Negate the source address(es)?
- Negate
User bool - Negate user
- Policy
Type string - Policy type
- Position string
- The position of a security rule
- Profile
Setting GetSecurity Rule Profile Setting - The security profile object
- Relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - Schedule string
- Schedule in which this rule will be applied
- Security
Settings GetSecurity Rule Security Settings - Security settings
- Services []string
- The service(s) being accessed
- Snippet string
- The snippet in which the resource is defined
- Source
Hips []string - The source Host Integrity Profile(s)
- Source
Users []string - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - Sources []string
- The source addresses(es)
- []string
- The tags associated with the security rule
- Target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - Tenant
Restrictions []string - Tenant restrictions
- Tfid string
- Tos []string
- The destination security zone(s)
- action String
- The action to be taken when the rule is matched
- allow
Url List<GetCategories Security Rule Allow Url Category> - Allow url category
- allow
Web List<GetApplications Security Rule Allow Web Application> - Allow web application
- applications List<String>
- The application(s) being accessed
- block
Url List<String>Categories - Block url category
- block
Web List<String>Applications - Block web application
- categories List<String>
- The URL categories being accessed
- default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- description String
- The description of the security rule
- destination
Hips List<String> - The destination Host Integrity Profile(s)
- destinations List<String>
- The destination address(es)
- device String
- The device in which the resource is defined
- devices List<String>
- Devices
- disabled Boolean
- Is the security rule disabled?
- folder String
- The folder in which the resource is defined
- froms List<String>
- The source security zone(s)
- id String
- The UUID of the security rule
- log
End Boolean - Log at session end?
- log
Setting String - The external log forwarding profile
- log
Settings GetSecurity Rule Log Settings - Log settings
- log
Start Boolean - Log at session start?
- name String
- The name of the security rule
- negate
Destination Boolean - Negate the destination addresses(es)?
- negate
Source Boolean - Negate the source address(es)?
- negate
User Boolean - Negate user
- policy
Type String - Policy type
- position String
- The position of a security rule
- profile
Setting GetSecurity Rule Profile Setting - The security profile object
- relative
Position String - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule String
- Schedule in which this rule will be applied
- security
Settings GetSecurity Rule Security Settings - Security settings
- services List<String>
- The service(s) being accessed
- snippet String
- The snippet in which the resource is defined
- source
Hips List<String> - The source Host Integrity Profile(s)
- source
Users List<String> - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources List<String>
- The source addresses(es)
- List<String>
- The tags associated with the security rule
- target
Rule String - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant
Restrictions List<String> - Tenant restrictions
- tfid String
- tos List<String>
- The destination security zone(s)
- action string
- The action to be taken when the rule is matched
- allow
Url GetCategories Security Rule Allow Url Category[] - Allow url category
- allow
Web GetApplications Security Rule Allow Web Application[] - Allow web application
- applications string[]
- The application(s) being accessed
- block
Url string[]Categories - Block url category
- block
Web string[]Applications - Block web application
- categories string[]
- The URL categories being accessed
- default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- description string
- The description of the security rule
- destination
Hips string[] - The destination Host Integrity Profile(s)
- destinations string[]
- The destination address(es)
- device string
- The device in which the resource is defined
- devices string[]
- Devices
- disabled boolean
- Is the security rule disabled?
- folder string
- The folder in which the resource is defined
- froms string[]
- The source security zone(s)
- id string
- The UUID of the security rule
- log
End boolean - Log at session end?
- log
Setting string - The external log forwarding profile
- log
Settings GetSecurity Rule Log Settings - Log settings
- log
Start boolean - Log at session start?
- name string
- The name of the security rule
- negate
Destination boolean - Negate the destination addresses(es)?
- negate
Source boolean - Negate the source address(es)?
- negate
User boolean - Negate user
- policy
Type string - Policy type
- position string
- The position of a security rule
- profile
Setting GetSecurity Rule Profile Setting - The security profile object
- relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule string
- Schedule in which this rule will be applied
- security
Settings GetSecurity Rule Security Settings - Security settings
- services string[]
- The service(s) being accessed
- snippet string
- The snippet in which the resource is defined
- source
Hips string[] - The source Host Integrity Profile(s)
- source
Users string[] - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources string[]
- The source addresses(es)
- string[]
- The tags associated with the security rule
- target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant
Restrictions string[] - Tenant restrictions
- tfid string
- tos string[]
- The destination security zone(s)
- action str
- The action to be taken when the rule is matched
- allow_
url_ Sequence[Getcategories Security Rule Allow Url Category] - Allow url category
- allow_
web_ Sequence[Getapplications Security Rule Allow Web Application] - Allow web application
- applications Sequence[str]
- The application(s) being accessed
- block_
url_ Sequence[str]categories - Block url category
- block_
web_ Sequence[str]applications - Block web application
- categories Sequence[str]
- The URL categories being accessed
- default_
profile_ Getsettings Security Rule Default Profile Settings - Default profile settings
- description str
- The description of the security rule
- destination_
hips Sequence[str] - The destination Host Integrity Profile(s)
- destinations Sequence[str]
- The destination address(es)
- device str
- The device in which the resource is defined
- devices Sequence[str]
- Devices
- disabled bool
- Is the security rule disabled?
- folder str
- The folder in which the resource is defined
- froms Sequence[str]
- The source security zone(s)
- id str
- The UUID of the security rule
- log_
end bool - Log at session end?
- log_
setting str - The external log forwarding profile
- log_
settings GetSecurity Rule Log Settings - Log settings
- log_
start bool - Log at session start?
- name str
- The name of the security rule
- negate_
destination bool - Negate the destination addresses(es)?
- negate_
source bool - Negate the source address(es)?
- negate_
user bool - Negate user
- policy_
type str - Policy type
- position str
- The position of a security rule
- profile_
setting GetSecurity Rule Profile Setting - The security profile object
- relative_
position str - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule str
- Schedule in which this rule will be applied
- security_
settings GetSecurity Rule Security Settings - Security settings
- services Sequence[str]
- The service(s) being accessed
- snippet str
- The snippet in which the resource is defined
- source_
hips Sequence[str] - The source Host Integrity Profile(s)
- source_
users Sequence[str] - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources Sequence[str]
- The source addresses(es)
- Sequence[str]
- The tags associated with the security rule
- target_
rule str - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant_
restrictions Sequence[str] - Tenant restrictions
- tfid str
- tos Sequence[str]
- The destination security zone(s)
- action String
- The action to be taken when the rule is matched
- allow
Url List<Property Map>Categories - Allow url category
- allow
Web List<Property Map>Applications - Allow web application
- applications List<String>
- The application(s) being accessed
- block
Url List<String>Categories - Block url category
- block
Web List<String>Applications - Block web application
- categories List<String>
- The URL categories being accessed
- default
Profile Property MapSettings - Default profile settings
- description String
- The description of the security rule
- destination
Hips List<String> - The destination Host Integrity Profile(s)
- destinations List<String>
- The destination address(es)
- device String
- The device in which the resource is defined
- devices List<String>
- Devices
- disabled Boolean
- Is the security rule disabled?
- folder String
- The folder in which the resource is defined
- froms List<String>
- The source security zone(s)
- id String
- The UUID of the security rule
- log
End Boolean - Log at session end?
- log
Setting String - The external log forwarding profile
- log
Settings Property Map - Log settings
- log
Start Boolean - Log at session start?
- name String
- The name of the security rule
- negate
Destination Boolean - Negate the destination addresses(es)?
- negate
Source Boolean - Negate the source address(es)?
- negate
User Boolean - Negate user
- policy
Type String - Policy type
- position String
- The position of a security rule
- profile
Setting Property Map - The security profile object
- relative
Position String - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule String
- Schedule in which this rule will be applied
- security
Settings Property Map - Security settings
- services List<String>
- The service(s) being accessed
- snippet String
- The snippet in which the resource is defined
- source
Hips List<String> - The source Host Integrity Profile(s)
- source
Users List<String> - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources List<String>
- The source addresses(es)
- List<String>
- The tags associated with the security rule
- target
Rule String - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant
Restrictions List<String> - Tenant restrictions
- tfid String
- tos List<String>
- The destination security zone(s)
Supporting Types
GetSecurityRuleAllowUrlCategory
- Additional
Action string - Additional action
- Credential
Enforcement string - Credential enforcement
- Decryption string
- Decryption
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Url Category File Control - File control
- Isolation
Profiles string - Isolation profiles
- Name string
- Name
- Additional
Action string - Additional action
- Credential
Enforcement string - Credential enforcement
- Decryption string
- Decryption
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Url Category File Control - File control
- Isolation
Profiles string - Isolation profiles
- Name string
- Name
- additional
Action String - Additional action
- credential
Enforcement String - Credential enforcement
- decryption String
- Decryption
- dlp String
- Dlp
- file
Control GetSecurity Rule Allow Url Category File Control - File control
- isolation
Profiles String - Isolation profiles
- name String
- Name
- additional
Action string - Additional action
- credential
Enforcement string - Credential enforcement
- decryption string
- Decryption
- dlp string
- Dlp
- file
Control GetSecurity Rule Allow Url Category File Control - File control
- isolation
Profiles string - Isolation profiles
- name string
- Name
- additional_
action str - Additional action
- credential_
enforcement str - Credential enforcement
- decryption str
- Decryption
- dlp str
- Dlp
- file_
control GetSecurity Rule Allow Url Category File Control - File control
- isolation_
profiles str - Isolation profiles
- name str
- Name
- additional
Action String - Additional action
- credential
Enforcement String - Credential enforcement
- decryption String
- Decryption
- dlp String
- Dlp
- file
Control Property Map - File control
- isolation
Profiles String - Isolation profiles
- name String
- Name
GetSecurityRuleAllowUrlCategoryFileControl
GetSecurityRuleAllowWebApplication
- Application
Functions List<string> - Application function
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Web Application File Control - File control
- Name string
- Name
- Saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- Saas
Tenant List<string>Lists - Saas tenant list
- Saas
User List<string>Lists - Saas user list
- Tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- Type string
- Type
- Application
Functions []string - Application function
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Web Application File Control - File control
- Name string
- Name
- Saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- Saas
Tenant []stringLists - Saas tenant list
- Saas
User []stringLists - Saas user list
- Tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- Type string
- Type
- application
Functions List<String> - Application function
- dlp String
- Dlp
- file
Control GetSecurity Rule Allow Web Application File Control - File control
- name String
- Name
- saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- saas
Tenant List<String>Lists - Saas tenant list
- saas
User List<String>Lists - Saas user list
- tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- type String
- Type
- application
Functions string[] - Application function
- dlp string
- Dlp
- file
Control GetSecurity Rule Allow Web Application File Control - File control
- name string
- Name
- saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- saas
Tenant string[]Lists - Saas tenant list
- saas
User string[]Lists - Saas user list
- tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- type string
- Type
- application_
functions Sequence[str] - Application function
- dlp str
- Dlp
- file_
control GetSecurity Rule Allow Web Application File Control - File control
- name str
- Name
- saas_
enterprise_ Getcontrol Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- saas_
tenant_ Sequence[str]lists - Saas tenant list
- saas_
user_ Sequence[str]lists - Saas user list
- tenant_
control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- type str
- Type
- application
Functions List<String> - Application function
- dlp String
- Dlp
- file
Control Property Map - File control
- name String
- Name
- saas
Enterprise Property MapControl - Saas enterprise control
- saas
Tenant List<String>Lists - Saas tenant list
- saas
User List<String>Lists - Saas user list
- tenant
Control Property Map - Tenant control
- type String
- Type
GetSecurityRuleAllowWebApplicationFileControl
GetSecurityRuleAllowWebApplicationSaasEnterpriseControl
- consumer
Access Property Map - Consumer access
- enterprise
Access Property Map - Enterprise access
GetSecurityRuleAllowWebApplicationSaasEnterpriseControlConsumerAccess
- Enable string
- Enable
- Enable string
- Enable
- enable String
- Enable
- enable string
- Enable
- enable str
- Enable
- enable String
- Enable
GetSecurityRuleAllowWebApplicationSaasEnterpriseControlEnterpriseAccess
- Enable string
- Enable
- Tenant
Restrictions List<string> - Tenant restrictions
- Enable string
- Enable
- Tenant
Restrictions []string - Tenant restrictions
- enable String
- Enable
- tenant
Restrictions List<String> - Tenant restrictions
- enable string
- Enable
- tenant
Restrictions string[] - Tenant restrictions
- enable str
- Enable
- tenant_
restrictions Sequence[str] - Tenant restrictions
- enable String
- Enable
- tenant
Restrictions List<String> - Tenant restrictions
GetSecurityRuleAllowWebApplicationTenantControl
- Allowed
Activities List<string> - Allowed activities
- Blocked
Activities List<string> - Blocked activities
- Parent
Application string - Parent application
- Tenants List<string>
- Tenants
- Allowed
Activities []string - Allowed activities
- Blocked
Activities []string - Blocked activities
- Parent
Application string - Parent application
- Tenants []string
- Tenants
- allowed
Activities List<String> - Allowed activities
- blocked
Activities List<String> - Blocked activities
- parent
Application String - Parent application
- tenants List<String>
- Tenants
- allowed
Activities string[] - Allowed activities
- blocked
Activities string[] - Blocked activities
- parent
Application string - Parent application
- tenants string[]
- Tenants
- allowed_
activities Sequence[str] - Allowed activities
- blocked_
activities Sequence[str] - Blocked activities
- parent_
application str - Parent application
- tenants Sequence[str]
- Tenants
- allowed
Activities List<String> - Allowed activities
- blocked
Activities List<String> - Blocked activities
- parent
Application String - Parent application
- tenants List<String>
- Tenants
GetSecurityRuleDefaultProfileSettings
- Dlp string
- Dlp
- File
Control GetSecurity Rule Default Profile Settings File Control - File control
- Dlp string
- Dlp
- File
Control GetSecurity Rule Default Profile Settings File Control - File control
- dlp String
- Dlp
- file
Control GetSecurity Rule Default Profile Settings File Control - File control
- dlp string
- Dlp
- file
Control GetSecurity Rule Default Profile Settings File Control - File control
- dlp str
- Dlp
- file_
control GetSecurity Rule Default Profile Settings File Control - File control
- dlp String
- Dlp
- file
Control Property Map - File control
GetSecurityRuleDefaultProfileSettingsFileControl
GetSecurityRuleLogSettings
- Log
Sessions bool - Log sessions
- Log
Sessions bool - Log sessions
- log
Sessions Boolean - Log sessions
- log
Sessions boolean - Log sessions
- log_
sessions bool - Log sessions
- log
Sessions Boolean - Log sessions
GetSecurityRuleProfileSetting
- Groups List<string>
- The security profile group
- Groups []string
- The security profile group
- groups List<String>
- The security profile group
- groups string[]
- The security profile group
- groups Sequence[str]
- The security profile group
- groups List<String>
- The security profile group
GetSecurityRuleSecuritySettings
- Anti
Spyware string - Anti spyware
- Virus
And stringWildfire Analysis - Virus and wildfire analysis
- Vulnerability string
- Vulnerability
- Anti
Spyware string - Anti spyware
- Virus
And stringWildfire Analysis - Virus and wildfire analysis
- Vulnerability string
- Vulnerability
- anti
Spyware String - Anti spyware
- virus
And StringWildfire Analysis - Virus and wildfire analysis
- vulnerability String
- Vulnerability
- anti
Spyware string - Anti spyware
- virus
And stringWildfire Analysis - Virus and wildfire analysis
- vulnerability string
- Vulnerability
- anti_
spyware str - Anti spyware
- virus_
and_ strwildfire_ analysis - Virus and wildfire analysis
- vulnerability str
- Vulnerability
- anti
Spyware String - Anti spyware
- virus
And StringWildfire Analysis - Virus and wildfire analysis
- vulnerability String
- Vulnerability
Package Details
- Repository
- scm pulumi/pulumi-scm
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
scmTerraform Provider.
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
