// This is an automatically generated code sample.
// To make this code sample work in your Oracle Cloud tenancy,
// please replace the values for any parameters whose current values do not fit
// your use case (such as resource IDs, strings containing ‘EXAMPLE’ or ‘unique_id’, and
// boolean, number, and enum parameters with values not fitting your use case).
import * as identitydomains from "oci-identitydomains";
import common = require("oci-common");
// Create a default authentication provider that uses the DEFAULT
// profile in the configuration file.
// Refer to <see href="https://docs.cloud.oracle.com/en-us/iaas/Content/API/Concepts/sdkconfig.htm#SDK_and_CLI_Configuration_File>the public documentation</see> on how to prepare a configuration file.
const provider: common.ConfigFileAuthenticationDetailsProvider = new common.ConfigFileAuthenticationDetailsProvider();
(async () => {
try {
// Create a service client
const client = new identitydomains.IdentityDomainsClient({ authenticationDetailsProvider: provider });
// Create a request and dependent object(s).
const passwordPolicy = {
id: "ocid1.test.oc1..<unique_ID>EXAMPLE-id-Value",
ocid: "EXAMPLE-ocid-Value",
schemas: ["EXAMPLE--Value" ],
meta: {
resourceType: "EXAMPLE-resourceType-Value",
created: "EXAMPLE-created-Value",
lastModified: "EXAMPLE-lastModified-Value",
location: "EXAMPLE-location-Value",
version: "EXAMPLE-version-Value",
}
,
idcsCreatedBy: {
value: "EXAMPLE-value-Value",
ref: "EXAMPLE-$ref-Value",
type: identitydomains.models.IdcsCreatedBy.Type.User,
display: "EXAMPLE-display-Value",
ocid: "EXAMPLE-ocid-Value",
}
,
idcsLastModifiedBy: {
value: "EXAMPLE-value-Value",
ref: "EXAMPLE-$ref-Value",
type: identitydomains.models.IdcsLastModifiedBy.Type.App,
display: "EXAMPLE-display-Value",
ocid: "EXAMPLE-ocid-Value",
}
,
idcsPreventedOperations: [identitydomains.models.IdcsPreventedOperations.Replace ],
tags: [{
key: "EXAMPLE-key-Value",
value: "EXAMPLE-value-Value",
}
],
deleteInProgress: false,
idcsLastUpgradedInRelease: "EXAMPLE-idcsLastUpgradedInRelease-Value",
domainOcid: "EXAMPLE-domainOcid-Value",
compartmentOcid: "EXAMPLE-compartmentOcid-Value",
tenancyOcid: "EXAMPLE-tenancyOcid-Value",
externalId: "ocid1.test.oc1..<unique_ID>EXAMPLE-externalId-Value",
name: "EXAMPLE-name-Value",
description: "EXAMPLE-description-Value",
maxLength: 23,
minLength: 688,
minAlphas: 651,
minNumerals: 952,
minAlphaNumerals: 847,
minSpecialChars: 444,
maxSpecialChars: 699,
minLowerCase: 317,
minUpperCase: 299,
minUniqueChars: 690,
maxRepeatedChars: 935,
startsWithAlphabet: false,
firstNameDisallowed: true,
lastNameDisallowed: true,
userNameDisallowed: false,
disallowedUserAttributeValues: ["EXAMPLE--Value" ],
minPasswordAge: 506,
passwordExpiresAfter: 841,
passwordExpireWarning: 736,
requiredChars: "EXAMPLE-requiredChars-Value",
disallowedChars: "EXAMPLE-disallowedChars-Value",
allowedChars: "EXAMPLE-allowedChars-Value",
disallowedSubstrings: ["EXAMPLE--Value" ],
dictionaryWordDisallowed: false,
dictionaryLocation: "EXAMPLE-dictionaryLocation-Value",
dictionaryDelimiter: "EXAMPLE-dictionaryDelimiter-Value",
maxIncorrectAttempts: 502,
lockoutDuration: 981,
numPasswordsInHistory: 654,
passwordStrength: identitydomains.models.PasswordPolicy.PasswordStrength.Simple,
forcePasswordReset: false,
distinctCharacters: 950,
priority: 117,
groups: [{
value: "EXAMPLE-value-Value",
ref: "EXAMPLE-$ref-Value",
display: "EXAMPLE-display-Value",
}
],
configuredPasswordPolicyRules: [{
key: "EXAMPLE-key-Value",
value: "EXAMPLE-value-Value",
}
],
}
const putPasswordPolicyRequest: identitydomains.requests.PutPasswordPolicyRequest = {
passwordPolicyId: "ocid1.test.oc1..<unique_ID>EXAMPLE-passwordPolicyId-Value",
authorization: "EXAMPLE-authorization-Value",
resourceTypeSchemaVersion: "EXAMPLE-resourceTypeSchemaVersion-Value",
attributes: "EXAMPLE-attributes-Value",
attributeSets: [identitydomains.models.AttributeSets.Request ],
passwordPolicy: passwordPolicy,
ifMatch: "EXAMPLE-ifMatch-Value",
opcRetryToken: "EXAMPLE-opcRetryToken-Value",
};
// Send request to the Client.
const putPasswordPolicyResponse = await client.putPasswordPolicy(putPasswordPolicyRequest);
}
catch (error) {
console.log("putPasswordPolicy Failed with error " + error);
}
})();