Skip to content

Commit

Permalink
Updated docker image to demisto/crypto:1.0.0.103269. PR batch #4/4
Browse files Browse the repository at this point in the history
  • Loading branch information
samuelFain committed Jul 14, 2024
1 parent 290e727 commit d4696cc
Show file tree
Hide file tree
Showing 3 changed files with 18 additions and 18 deletions.
19 changes: 10 additions & 9 deletions Packs/Okta/Integrations/Okta_v2/Okta_v2.yml
Original file line number Diff line number Diff line change
Expand Up @@ -338,7 +338,7 @@ script:
description: The manager email.
type: String
- arguments:
- description: "The cursor in which to retrive the results from and on. if the query didn't reach the end of results, the tag can be obtained from the bottom of the grid in the readable output, or in the context path Okta.User.tag."
- description: The cursor in which to retrive the results from and on. if the query didn't reach the end of results, the tag can be obtained from the bottom of the grid in the readable output, or in the context path Okta.User.tag.
name: after
- description: The maximum number of results to return.
name: limit
Expand All @@ -353,7 +353,7 @@ script:
- 'false'
- description: Searches the name property of groups for matching values.
name: query
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \n type eq \"OKTA_GROUP\" - Groups that have a type of OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \n type eq \"OKTA_GROUP\" - Groups that have a\_type\_of\_OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
name: filter
description: Lists users in your organization.
name: okta-list-users
Expand Down Expand Up @@ -647,7 +647,7 @@ script:
- arguments:
- description: Searches the name property of groups for matching values.
name: query
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \n type eq \"OKTA_GROUP\" - Groups that have a type of OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
- description: "Useful for performing structured queries where constraints on group attribute values can be explicitly targeted. \nThe following expressions are supported(among others) for groups with the filter query parameter: \n type eq \"OKTA_GROUP\" - Groups that have a\_type\_of\_OKTA_GROUP; lastUpdated lt \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with profile last updated before a specific timestamp; lastMembershipUpdated eq \"yyyy-MM-dd''T''HH:mm:ss.SSSZ\" - Groups with memberships last updated at a specific timestamp; id eq \"00g1emaKYZTWRYYRRTSK\" - Group with a specified ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
name: filter
- defaultValue: '200'
description: The maximum number of results to return. The default is 200.
Expand Down Expand Up @@ -795,7 +795,7 @@ script:
- arguments:
- description: "Useful for performing structured queries where constraints on LogEvent attribute values can be explicitly targeted. \nThe following expressions are supported for events with the filter query parameter: eventType eq \" :eventType\" \n-Events that have a specific action; eventType target.id eq \":id\" \n- Events published with a specific target id; actor.id eq \":id\"\n- Events published with a specific actor ID. For more information about filtering, visit https://developer.okta.com/docs/api/getting_started/design_principles#filtering"
name: filter
- description: "The query parameter can be used to perform keyword matching against a LogEvents object’s attribute values. To satisfy the constraint, all supplied keywords must be matched exactly. Note that matching is case-insensitive. The following are some examples of common keyword filtering: \nEvents that mention a specific city: query=San Francisco; \nEvents that mention a specific url: query=interestingURI.com; \nEvents that mention a specific person: query=firstName lastName."
- description: "The query parameter can be used to perform keyword matching against a LogEvents object\u2019s attribute values. To satisfy the constraint, all supplied keywords must be matched exactly. Note that matching is case-insensitive. The following are some examples of common keyword filtering: \nEvents that mention a specific city: query=San Francisco; \nEvents that mention a specific url: query=interestingURI.com; \nEvents that mention a specific person: query=firstName lastName."
name: query
- description: 'Filters the lower time bound of the log events in the Internet Date/Time Format profile of ISO 8601. For example: 2017-05-03T16:22:18Z.'
name: since
Expand Down Expand Up @@ -1264,10 +1264,11 @@ script:
- description: Okta User ID.
name: userId
required: true
description: |-
Removes all active identity provider sessions. This forces the user to authenticate upon the next operation. Optionally revokes OpenID Connect and OAuth refresh and access tokens issued to the user.
description: 'Removes all active identity provider sessions. This forces the user to authenticate upon the next operation. Optionally revokes OpenID Connect and OAuth refresh and access tokens issued to the user.
For more information and examples:
https://developer.okta.com/docs/reference/api/users/#user-sessions
https://developer.okta.com/docs/reference/api/users/#user-sessions'
name: okta-clear-user-sessions
- arguments:
- description: The maximum number of results to return.
Expand Down Expand Up @@ -1485,9 +1486,9 @@ script:
type: String
- description: Reset OAuth authentication data (authentication process will start from the beginning, and a new token will be generated).
name: okta-auth-reset
dockerimage: demisto/crypto:1.0.0.95384
dockerimage: demisto/crypto:1.0.0.103269
runonce: false
script: ""
script: ''
subtype: python3
type: python
fromversion: 5.0.0
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -54,9 +54,9 @@ configuration:
name: incidentFetchInterval
type: 19
required: false
description: |-
Use the Palo Alto Networks Threat Vault to research the latest threats (vulnerabilities/exploits, viruses, and spyware) that Palo Alto Networks next-generation firewalls can detect and prevent.
Query the Advanced Threat Protection (ATP) API endpoint for Analysis reports and PCAPs
description: 'Use the Palo Alto Networks Threat Vault to research the latest threats (vulnerabilities/exploits, viruses, and spyware) that Palo Alto Networks next-generation firewalls can detect and prevent.
Query the Advanced Threat Protection (ATP) API endpoint for Analysis reports and PCAPs'
display: Palo Alto Networks Threat Vault v2
name: Palo Alto Networks Threat Vault v2
script:
Expand Down Expand Up @@ -854,15 +854,15 @@ script:
name: vendor
- description: The signature name.
name: signature-name
- description: "The release dates range (used with the to-release-date argument), Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year)."
- description: 'The release dates range (used with the to-release-date argument), Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year).'
name: from-release-date
- description: "The right boundary of date range query (used with the from-release-date argument), Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year)."
- description: 'The right boundary of date range query (used with the from-release-date argument), Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year).'
name: to-release-date
- description: The release versions range (used with the to-release-version argument).
name: from-release-version
- description: The right boundary of version range query (used with the from-release-version argument).
name: to-release-version
- description: "The release date, Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year)."
- description: 'The release date, Format: YYYY-MM-DD or timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year).'
name: release-date
- description: The release version.
name: release-version
Expand Down Expand Up @@ -1244,7 +1244,7 @@ script:
- contextPath: ThreatVault.ATP.PCAP.Name
description: Threatvault ATP PCAP Name
type: string
dockerimage: demisto/crypto:1.0.0.86361
dockerimage: demisto/crypto:1.0.0.103269
isfetch: true
script: ''
subtype: python3
Expand Down
3 changes: 1 addition & 2 deletions Packs/SymantecMSS/Integrations/SymantecMSS/SymantecMSS.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,6 @@ configuration:
display: Fetch incidents for severities
name: severities
type: 0

required: false
description: Leverage the power of Symantec Managed Security Services for continual threat monitoring and customized guidance 24x7.
display: Symantec Managed Security Services
Expand Down Expand Up @@ -85,7 +84,7 @@ script:
name: max
description: Get a list of incidents.
name: symantec-mss-incidents-list
dockerimage: demisto/crypto:1.0.0.89294
dockerimage: demisto/crypto:1.0.0.103269
isfetch: true
runonce: false
script: '-'
Expand Down

0 comments on commit d4696cc

Please sign in to comment.