Cisco Meraki v0.2.4 published on Friday, Jun 14, 2024 by Pulumi
meraki.organizations.getApplianceVpnThirdPartyVpnpeers
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as meraki from "@pulumi/meraki";
const example = meraki.organizations.getApplianceVpnThirdPartyVpnpeers({
    organizationId: "string",
});
export const merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample = example.then(example => example.item);
import pulumi
import pulumi_meraki as meraki
example = meraki.organizations.get_appliance_vpn_third_party_vpnpeers(organization_id="string")
pulumi.export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.item)
package main
import (
	"github.com/pulumi/pulumi-meraki/sdk/go/meraki/organizations"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		example, err := organizations.LookupApplianceVpnThirdPartyVpnpeers(ctx, &organizations.LookupApplianceVpnThirdPartyVpnpeersArgs{
			OrganizationId: "string",
		}, nil)
		if err != nil {
			return err
		}
		ctx.Export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.Item)
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Meraki = Pulumi.Meraki;
return await Deployment.RunAsync(() => 
{
    var example = Meraki.Organizations.GetApplianceVpnThirdPartyVpnpeers.Invoke(new()
    {
        OrganizationId = "string",
    });
    return new Dictionary<string, object?>
    {
        ["merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample"] = example.Apply(getApplianceVpnThirdPartyVpnpeersResult => getApplianceVpnThirdPartyVpnpeersResult.Item),
    };
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.organizations.OrganizationsFunctions;
import com.pulumi.meraki.organizations.inputs.GetApplianceVpnThirdPartyVpnpeersArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var example = OrganizationsFunctions.getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs.builder()
            .organizationId("string")
            .build());
        ctx.export("merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample", example.applyValue(getApplianceVpnThirdPartyVpnpeersResult -> getApplianceVpnThirdPartyVpnpeersResult.item()));
    }
}
variables:
  example:
    fn::invoke:
      Function: meraki:organizations:getApplianceVpnThirdPartyVpnpeers
      Arguments:
        organizationId: string
outputs:
  merakiOrganizationsApplianceVpnThirdPartyVpnpeersExample: ${example.item}
Using getApplianceVpnThirdPartyVpnpeers
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getApplianceVpnThirdPartyVpnpeers(args: GetApplianceVpnThirdPartyVpnpeersArgs, opts?: InvokeOptions): Promise<GetApplianceVpnThirdPartyVpnpeersResult>
function getApplianceVpnThirdPartyVpnpeersOutput(args: GetApplianceVpnThirdPartyVpnpeersOutputArgs, opts?: InvokeOptions): Output<GetApplianceVpnThirdPartyVpnpeersResult>def get_appliance_vpn_third_party_vpnpeers(organization_id: Optional[str] = None,
                                           opts: Optional[InvokeOptions] = None) -> GetApplianceVpnThirdPartyVpnpeersResult
def get_appliance_vpn_third_party_vpnpeers_output(organization_id: Optional[pulumi.Input[str]] = None,
                                           opts: Optional[InvokeOptions] = None) -> Output[GetApplianceVpnThirdPartyVpnpeersResult]func LookupApplianceVpnThirdPartyVpnpeers(ctx *Context, args *LookupApplianceVpnThirdPartyVpnpeersArgs, opts ...InvokeOption) (*LookupApplianceVpnThirdPartyVpnpeersResult, error)
func LookupApplianceVpnThirdPartyVpnpeersOutput(ctx *Context, args *LookupApplianceVpnThirdPartyVpnpeersOutputArgs, opts ...InvokeOption) LookupApplianceVpnThirdPartyVpnpeersResultOutput> Note: This function is named LookupApplianceVpnThirdPartyVpnpeers in the Go SDK.
public static class GetApplianceVpnThirdPartyVpnpeers 
{
    public static Task<GetApplianceVpnThirdPartyVpnpeersResult> InvokeAsync(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions? opts = null)
    public static Output<GetApplianceVpnThirdPartyVpnpeersResult> Invoke(GetApplianceVpnThirdPartyVpnpeersInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetApplianceVpnThirdPartyVpnpeersResult> getApplianceVpnThirdPartyVpnpeers(GetApplianceVpnThirdPartyVpnpeersArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
  function: meraki:organizations/getApplianceVpnThirdPartyVpnpeers:getApplianceVpnThirdPartyVpnpeers
  arguments:
    # arguments dictionaryThe following arguments are supported:
- Organization
Id string - organizationId path parameter. Organization ID
 
- Organization
Id string - organizationId path parameter. Organization ID
 
- organization
Id String - organizationId path parameter. Organization ID
 
- organization
Id string - organizationId path parameter. Organization ID
 
- organization_
id str - organizationId path parameter. Organization ID
 
- organization
Id String - organizationId path parameter. Organization ID
 
getApplianceVpnThirdPartyVpnpeers Result
The following output properties are available:
- Id string
 - The provider-assigned unique ID for this managed resource.
 - Item
Get
Appliance Vpn Third Party Vpnpeers Item  - Organization
Id string - organizationId path parameter. Organization ID
 
- Id string
 - The provider-assigned unique ID for this managed resource.
 - Item
Get
Appliance Vpn Third Party Vpnpeers Item  - Organization
Id string - organizationId path parameter. Organization ID
 
- id String
 - The provider-assigned unique ID for this managed resource.
 - item
Get
Appliance Vpn Third Party Vpnpeers Item  - organization
Id String - organizationId path parameter. Organization ID
 
- id string
 - The provider-assigned unique ID for this managed resource.
 - item
Get
Appliance Vpn Third Party Vpnpeers Item  - organization
Id string - organizationId path parameter. Organization ID
 
- id str
 - The provider-assigned unique ID for this managed resource.
 - item
Get
Appliance Vpn Third Party Vpnpeers Item  - organization_
id str - organizationId path parameter. Organization ID
 
- id String
 - The provider-assigned unique ID for this managed resource.
 - item Property Map
 - organization
Id String - organizationId path parameter. Organization ID
 
Supporting Types
GetApplianceVpnThirdPartyVpnpeersItem      
- Peers
List<Get
Appliance Vpn Third Party Vpnpeers Item Peer>  - The list of VPN peers
 
- Peers
[]Get
Appliance Vpn Third Party Vpnpeers Item Peer  - The list of VPN peers
 
- peers
List<Get
Appliance Vpn Third Party Vpnpeers Item Peer>  - The list of VPN peers
 
- peers
Get
Appliance Vpn Third Party Vpnpeers Item Peer[]  - The list of VPN peers
 
- peers
Sequence[Get
Appliance Vpn Third Party Vpnpeers Item Peer]  - The list of VPN peers
 
- peers List<Property Map>
 - The list of VPN peers
 
GetApplianceVpnThirdPartyVpnpeersItemPeer       
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
 - Ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies  - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
 - Ipsec
Policies stringPreset  - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
 - Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
 - Name string
 - The name of the VPN peer
 - List<string>
 - A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
 - Private
Subnets List<string> - The list of the private subnets of the VPN peer
 - Public
Ip string - [optional] The public IP of the VPN peer
 - Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
 - Secret string
 - The shared secret with the VPN peer
 
- Ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
 - Ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies  - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
 - Ipsec
Policies stringPreset  - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
 - Local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
 - Name string
 - The name of the VPN peer
 - []string
 - A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
 - Private
Subnets []string - The list of the private subnets of the VPN peer
 - Public
Ip string - [optional] The public IP of the VPN peer
 - Remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
 - Secret string
 - The shared secret with the VPN peer
 
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
 - ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies  - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
 - ipsec
Policies StringPreset  - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
 - local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
 - name String
 - The name of the VPN peer
 - List<String>
 - A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
 - private
Subnets List<String> - The list of the private subnets of the VPN peer
 - public
Ip String - [optional] The public IP of the VPN peer
 - remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
 - secret String
 - The shared secret with the VPN peer
 
- ike
Version string - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
 - ipsec
Policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies  - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
 - ipsec
Policies stringPreset  - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
 - local
Id string - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
 - name string
 - The name of the VPN peer
 - string[]
 - A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
 - private
Subnets string[] - The list of the private subnets of the VPN peer
 - public
Ip string - [optional] The public IP of the VPN peer
 - remote
Id string - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
 - secret string
 - The shared secret with the VPN peer
 
- ike_
version str - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
 - ipsec_
policies GetAppliance Vpn Third Party Vpnpeers Item Peer Ipsec Policies  - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
 - ipsec_
policies_ strpreset  - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
 - local_
id str - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
 - name str
 - The name of the VPN peer
 - Sequence[str]
 - A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
 - private_
subnets Sequence[str] - The list of the private subnets of the VPN peer
 - public_
ip str - [optional] The public IP of the VPN peer
 - remote_
id str - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
 - secret str
 - The shared secret with the VPN peer
 
- ike
Version String - [optional] The IKE version to be used for the IPsec VPN peer configuration. Defaults to '1' when omitted.
 - ipsec
Policies Property Map - Custom IPSec policies for the VPN peer. If not included and a preset has not been chosen, the default preset for IPSec policies will be used.
 - ipsec
Policies StringPreset  - One of the following available presets: 'default', 'aws', 'azure'. If this is provided, the 'ipsecPolicies' parameter is ignored.
 - local
Id String - [optional] The local ID is used to identify the MX to the peer. This will apply to all MXs this peer applies to.
 - name String
 - The name of the VPN peer
 - List<String>
 - A list of network tags that will connect with this peer. Use ['all'] for all networks. Use ['none'] for no networks. If not included, the default is ['all'].
 - private
Subnets List<String> - The list of the private subnets of the VPN peer
 - public
Ip String - [optional] The public IP of the VPN peer
 - remote
Id String - [optional] The remote ID is used to identify the connecting VPN peer. This can either be a valid IPv4 Address, FQDN or User FQDN.
 - secret String
 - The shared secret with the VPN peer
 
GetApplianceVpnThirdPartyVpnpeersItemPeerIpsecPolicies         
- Child
Auth List<string>Algos  - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - Child
Cipher List<string>Algos  - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
 - Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
 - Child
Pfs List<string>Groups  - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
 - Ike
Auth List<string>Algos  - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - Ike
Cipher List<string>Algos  - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
 - Ike
Diffie List<string>Hellman Groups  - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
 - Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
 - Ike
Prf List<string>Algos  - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
 
- Child
Auth []stringAlgos  - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - Child
Cipher []stringAlgos  - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
 - Child
Lifetime int - The lifetime of the Phase 2 SA in seconds.
 - Child
Pfs []stringGroups  - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
 - Ike
Auth []stringAlgos  - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - Ike
Cipher []stringAlgos  - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
 - Ike
Diffie []stringHellman Groups  - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
 - Ike
Lifetime int - The lifetime of the Phase 1 SA in seconds.
 - Ike
Prf []stringAlgos  - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
 
- child
Auth List<String>Algos  - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - child
Cipher List<String>Algos  - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
 - child
Lifetime Integer - The lifetime of the Phase 2 SA in seconds.
 - child
Pfs List<String>Groups  - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
 - ike
Auth List<String>Algos  - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - ike
Cipher List<String>Algos  - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
 - ike
Diffie List<String>Hellman Groups  - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
 - ike
Lifetime Integer - The lifetime of the Phase 1 SA in seconds.
 - ike
Prf List<String>Algos  - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
 
- child
Auth string[]Algos  - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - child
Cipher string[]Algos  - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
 - child
Lifetime number - The lifetime of the Phase 2 SA in seconds.
 - child
Pfs string[]Groups  - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
 - ike
Auth string[]Algos  - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - ike
Cipher string[]Algos  - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
 - ike
Diffie string[]Hellman Groups  - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
 - ike
Lifetime number - The lifetime of the Phase 1 SA in seconds.
 - ike
Prf string[]Algos  - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
 
- child_
auth_ Sequence[str]algos  - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - child_
cipher_ Sequence[str]algos  - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
 - child_
lifetime int - The lifetime of the Phase 2 SA in seconds.
 - child_
pfs_ Sequence[str]groups  - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
 - ike_
auth_ Sequence[str]algos  - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - ike_
cipher_ Sequence[str]algos  - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
 - ike_
diffie_ Sequence[str]hellman_ groups  - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
 - ike_
lifetime int - The lifetime of the Phase 1 SA in seconds.
 - ike_
prf_ Sequence[str]algos  - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
 
- child
Auth List<String>Algos  - This is the authentication algorithms to be used in Phase 2. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - child
Cipher List<String>Algos  - This is the cipher algorithms to be used in Phase 2. The value should be an array with one or more of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des', 'null'
 - child
Lifetime Number - The lifetime of the Phase 2 SA in seconds.
 - child
Pfs List<String>Groups  - This is the Diffie-Hellman group to be used for Perfect Forward Secrecy in Phase 2. The value should be an array with one of the following values: 'disabled','group14', 'group5', 'group2', 'group1'
 - ike
Auth List<String>Algos  - This is the authentication algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'sha256', 'sha1', 'md5'
 - ike
Cipher List<String>Algos  - This is the cipher algorithm to be used in Phase 1. The value should be an array with one of the following algorithms: 'aes256', 'aes192', 'aes128', 'tripledes', 'des'
 - ike
Diffie List<String>Hellman Groups  - This is the Diffie-Hellman group to be used in Phase 1. The value should be an array with one of the following algorithms: 'group14', 'group5', 'group2', 'group1'
 - ike
Lifetime Number - The lifetime of the Phase 1 SA in seconds.
 - ike
Prf List<String>Algos  - [optional] This is the pseudo-random function to be used in IKE_SA. The value should be an array with one of the following algorithms: 'prfsha256', 'prfsha1', 'prfmd5', 'default'. The 'default' option can be used to default to the Authentication algorithm.
 
Package Details
- Repository
 - meraki pulumi/pulumi-meraki
 - License
 - Apache-2.0
 - Notes
 - This Pulumi package is based on the 
merakiTerraform Provider.