fortios.system.Accprofile
Explore with Pulumi AI
Configure access profiles for system administrators.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as fortios from "@pulumiverse/fortios";
const test12 = new fortios.system.Accprofile("test12", {
    admintimeout: 10,
    admintimeoutOverride: "disable",
    authgrp: "read-write",
    ftviewgrp: "read-write",
    fwgrp: "custom",
    fwgrpPermission: {
        address: "read-write",
        policy: "read-write",
        schedule: "none",
        service: "none",
    },
    loggrp: "read-write",
    loggrpPermission: {
        config: "none",
        dataAccess: "none",
        reportAccess: "none",
        threatWeight: "none",
    },
    netgrp: "read-write",
    netgrpPermission: {
        cfg: "none",
        packetCapture: "none",
        routeCfg: "none",
    },
    scope: "vdom",
    secfabgrp: "read-write",
    sysgrp: "read-write",
    sysgrpPermission: {
        admin: "none",
        cfg: "none",
        mnt: "none",
        upd: "none",
    },
    utmgrp: "custom",
    utmgrpPermission: {
        antivirus: "read-write",
        applicationControl: "none",
        dataLossPrevention: "none",
        dnsfilter: "none",
        endpointControl: "none",
        icap: "none",
        ips: "read-write",
        voip: "none",
        waf: "none",
        webfilter: "none",
    },
    vpngrp: "read-write",
    wanoptgrp: "read-write",
    wifi: "read-write",
});
import pulumi
import pulumiverse_fortios as fortios
test12 = fortios.system.Accprofile("test12",
    admintimeout=10,
    admintimeout_override="disable",
    authgrp="read-write",
    ftviewgrp="read-write",
    fwgrp="custom",
    fwgrp_permission=fortios.system.AccprofileFwgrpPermissionArgs(
        address="read-write",
        policy="read-write",
        schedule="none",
        service="none",
    ),
    loggrp="read-write",
    loggrp_permission=fortios.system.AccprofileLoggrpPermissionArgs(
        config="none",
        data_access="none",
        report_access="none",
        threat_weight="none",
    ),
    netgrp="read-write",
    netgrp_permission=fortios.system.AccprofileNetgrpPermissionArgs(
        cfg="none",
        packet_capture="none",
        route_cfg="none",
    ),
    scope="vdom",
    secfabgrp="read-write",
    sysgrp="read-write",
    sysgrp_permission=fortios.system.AccprofileSysgrpPermissionArgs(
        admin="none",
        cfg="none",
        mnt="none",
        upd="none",
    ),
    utmgrp="custom",
    utmgrp_permission=fortios.system.AccprofileUtmgrpPermissionArgs(
        antivirus="read-write",
        application_control="none",
        data_loss_prevention="none",
        dnsfilter="none",
        endpoint_control="none",
        icap="none",
        ips="read-write",
        voip="none",
        waf="none",
        webfilter="none",
    ),
    vpngrp="read-write",
    wanoptgrp="read-write",
    wifi="read-write")
package main
import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/system"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := system.NewAccprofile(ctx, "test12", &system.AccprofileArgs{
			Admintimeout:         pulumi.Int(10),
			AdmintimeoutOverride: pulumi.String("disable"),
			Authgrp:              pulumi.String("read-write"),
			Ftviewgrp:            pulumi.String("read-write"),
			Fwgrp:                pulumi.String("custom"),
			FwgrpPermission: &system.AccprofileFwgrpPermissionArgs{
				Address:  pulumi.String("read-write"),
				Policy:   pulumi.String("read-write"),
				Schedule: pulumi.String("none"),
				Service:  pulumi.String("none"),
			},
			Loggrp: pulumi.String("read-write"),
			LoggrpPermission: &system.AccprofileLoggrpPermissionArgs{
				Config:       pulumi.String("none"),
				DataAccess:   pulumi.String("none"),
				ReportAccess: pulumi.String("none"),
				ThreatWeight: pulumi.String("none"),
			},
			Netgrp: pulumi.String("read-write"),
			NetgrpPermission: &system.AccprofileNetgrpPermissionArgs{
				Cfg:           pulumi.String("none"),
				PacketCapture: pulumi.String("none"),
				RouteCfg:      pulumi.String("none"),
			},
			Scope:     pulumi.String("vdom"),
			Secfabgrp: pulumi.String("read-write"),
			Sysgrp:    pulumi.String("read-write"),
			SysgrpPermission: &system.AccprofileSysgrpPermissionArgs{
				Admin: pulumi.String("none"),
				Cfg:   pulumi.String("none"),
				Mnt:   pulumi.String("none"),
				Upd:   pulumi.String("none"),
			},
			Utmgrp: pulumi.String("custom"),
			UtmgrpPermission: &system.AccprofileUtmgrpPermissionArgs{
				Antivirus:          pulumi.String("read-write"),
				ApplicationControl: pulumi.String("none"),
				DataLossPrevention: pulumi.String("none"),
				Dnsfilter:          pulumi.String("none"),
				EndpointControl:    pulumi.String("none"),
				Icap:               pulumi.String("none"),
				Ips:                pulumi.String("read-write"),
				Voip:               pulumi.String("none"),
				Waf:                pulumi.String("none"),
				Webfilter:          pulumi.String("none"),
			},
			Vpngrp:    pulumi.String("read-write"),
			Wanoptgrp: pulumi.String("read-write"),
			Wifi:      pulumi.String("read-write"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortios = Pulumiverse.Fortios;
return await Deployment.RunAsync(() => 
{
    var test12 = new Fortios.System.Accprofile("test12", new()
    {
        Admintimeout = 10,
        AdmintimeoutOverride = "disable",
        Authgrp = "read-write",
        Ftviewgrp = "read-write",
        Fwgrp = "custom",
        FwgrpPermission = new Fortios.System.Inputs.AccprofileFwgrpPermissionArgs
        {
            Address = "read-write",
            Policy = "read-write",
            Schedule = "none",
            Service = "none",
        },
        Loggrp = "read-write",
        LoggrpPermission = new Fortios.System.Inputs.AccprofileLoggrpPermissionArgs
        {
            Config = "none",
            DataAccess = "none",
            ReportAccess = "none",
            ThreatWeight = "none",
        },
        Netgrp = "read-write",
        NetgrpPermission = new Fortios.System.Inputs.AccprofileNetgrpPermissionArgs
        {
            Cfg = "none",
            PacketCapture = "none",
            RouteCfg = "none",
        },
        Scope = "vdom",
        Secfabgrp = "read-write",
        Sysgrp = "read-write",
        SysgrpPermission = new Fortios.System.Inputs.AccprofileSysgrpPermissionArgs
        {
            Admin = "none",
            Cfg = "none",
            Mnt = "none",
            Upd = "none",
        },
        Utmgrp = "custom",
        UtmgrpPermission = new Fortios.System.Inputs.AccprofileUtmgrpPermissionArgs
        {
            Antivirus = "read-write",
            ApplicationControl = "none",
            DataLossPrevention = "none",
            Dnsfilter = "none",
            EndpointControl = "none",
            Icap = "none",
            Ips = "read-write",
            Voip = "none",
            Waf = "none",
            Webfilter = "none",
        },
        Vpngrp = "read-write",
        Wanoptgrp = "read-write",
        Wifi = "read-write",
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortios.system.Accprofile;
import com.pulumi.fortios.system.AccprofileArgs;
import com.pulumi.fortios.system.inputs.AccprofileFwgrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileLoggrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileNetgrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileSysgrpPermissionArgs;
import com.pulumi.fortios.system.inputs.AccprofileUtmgrpPermissionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var test12 = new Accprofile("test12", AccprofileArgs.builder()        
            .admintimeout(10)
            .admintimeoutOverride("disable")
            .authgrp("read-write")
            .ftviewgrp("read-write")
            .fwgrp("custom")
            .fwgrpPermission(AccprofileFwgrpPermissionArgs.builder()
                .address("read-write")
                .policy("read-write")
                .schedule("none")
                .service("none")
                .build())
            .loggrp("read-write")
            .loggrpPermission(AccprofileLoggrpPermissionArgs.builder()
                .config("none")
                .dataAccess("none")
                .reportAccess("none")
                .threatWeight("none")
                .build())
            .netgrp("read-write")
            .netgrpPermission(AccprofileNetgrpPermissionArgs.builder()
                .cfg("none")
                .packetCapture("none")
                .routeCfg("none")
                .build())
            .scope("vdom")
            .secfabgrp("read-write")
            .sysgrp("read-write")
            .sysgrpPermission(AccprofileSysgrpPermissionArgs.builder()
                .admin("none")
                .cfg("none")
                .mnt("none")
                .upd("none")
                .build())
            .utmgrp("custom")
            .utmgrpPermission(AccprofileUtmgrpPermissionArgs.builder()
                .antivirus("read-write")
                .applicationControl("none")
                .dataLossPrevention("none")
                .dnsfilter("none")
                .endpointControl("none")
                .icap("none")
                .ips("read-write")
                .voip("none")
                .waf("none")
                .webfilter("none")
                .build())
            .vpngrp("read-write")
            .wanoptgrp("read-write")
            .wifi("read-write")
            .build());
    }
}
resources:
  test12:
    type: fortios:system:Accprofile
    properties:
      admintimeout: 10
      admintimeoutOverride: disable
      authgrp: read-write
      ftviewgrp: read-write
      fwgrp: custom
      fwgrpPermission:
        address: read-write
        policy: read-write
        schedule: none
        service: none
      loggrp: read-write
      loggrpPermission:
        config: none
        dataAccess: none
        reportAccess: none
        threatWeight: none
      netgrp: read-write
      netgrpPermission:
        cfg: none
        packetCapture: none
        routeCfg: none
      scope: vdom
      secfabgrp: read-write
      sysgrp: read-write
      sysgrpPermission:
        admin: none
        cfg: none
        mnt: none
        upd: none
      utmgrp: custom
      utmgrpPermission:
        antivirus: read-write
        applicationControl: none
        dataLossPrevention: none
        dnsfilter: none
        endpointControl: none
        icap: none
        ips: read-write
        voip: none
        waf: none
        webfilter: none
      vpngrp: read-write
      wanoptgrp: read-write
      wifi: read-write
Create Accprofile Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Accprofile(name: string, args?: AccprofileArgs, opts?: CustomResourceOptions);@overload
def Accprofile(resource_name: str,
               args: Optional[AccprofileArgs] = None,
               opts: Optional[ResourceOptions] = None)
@overload
def Accprofile(resource_name: str,
               opts: Optional[ResourceOptions] = None,
               admintimeout: Optional[int] = None,
               admintimeout_override: Optional[str] = None,
               authgrp: Optional[str] = None,
               cli_config: Optional[str] = None,
               cli_diagnose: Optional[str] = None,
               cli_exec: Optional[str] = None,
               cli_get: Optional[str] = None,
               cli_show: Optional[str] = None,
               comments: Optional[str] = None,
               ftviewgrp: Optional[str] = None,
               fwgrp: Optional[str] = None,
               fwgrp_permission: Optional[AccprofileFwgrpPermissionArgs] = None,
               get_all_tables: Optional[str] = None,
               loggrp: Optional[str] = None,
               loggrp_permission: Optional[AccprofileLoggrpPermissionArgs] = None,
               name: Optional[str] = None,
               netgrp: Optional[str] = None,
               netgrp_permission: Optional[AccprofileNetgrpPermissionArgs] = None,
               scope: Optional[str] = None,
               secfabgrp: Optional[str] = None,
               sysgrp: Optional[str] = None,
               sysgrp_permission: Optional[AccprofileSysgrpPermissionArgs] = None,
               system_diagnostics: Optional[str] = None,
               system_execute_ssh: Optional[str] = None,
               system_execute_telnet: Optional[str] = None,
               utmgrp: Optional[str] = None,
               utmgrp_permission: Optional[AccprofileUtmgrpPermissionArgs] = None,
               vdomparam: Optional[str] = None,
               vpngrp: Optional[str] = None,
               wanoptgrp: Optional[str] = None,
               wifi: Optional[str] = None)func NewAccprofile(ctx *Context, name string, args *AccprofileArgs, opts ...ResourceOption) (*Accprofile, error)public Accprofile(string name, AccprofileArgs? args = null, CustomResourceOptions? opts = null)
public Accprofile(String name, AccprofileArgs args)
public Accprofile(String name, AccprofileArgs args, CustomResourceOptions options)
type: fortios:system:Accprofile
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
 - The unique name of the resource.
 - args AccprofileArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- resource_name str
 - The unique name of the resource.
 - args AccprofileArgs
 - The arguments to resource properties.
 - opts ResourceOptions
 - Bag of options to control resource's behavior.
 
- ctx Context
 - Context object for the current deployment.
 - name string
 - The unique name of the resource.
 - args AccprofileArgs
 - The arguments to resource properties.
 - opts ResourceOption
 - Bag of options to control resource's behavior.
 
- name string
 - The unique name of the resource.
 - args AccprofileArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- name String
 - The unique name of the resource.
 - args AccprofileArgs
 - The arguments to resource properties.
 - options CustomResourceOptions
 - Bag of options to control resource's behavior.
 
Constructor example
The following reference example uses placeholder values for all input properties.
var accprofileResource = new Fortios.System.Accprofile("accprofileResource", new()
{
    Admintimeout = 0,
    AdmintimeoutOverride = "string",
    Authgrp = "string",
    CliConfig = "string",
    CliDiagnose = "string",
    CliExec = "string",
    CliGet = "string",
    CliShow = "string",
    Comments = "string",
    Ftviewgrp = "string",
    Fwgrp = "string",
    FwgrpPermission = new Fortios.System.Inputs.AccprofileFwgrpPermissionArgs
    {
        Address = "string",
        Others = "string",
        Policy = "string",
        Schedule = "string",
        Service = "string",
    },
    GetAllTables = "string",
    Loggrp = "string",
    LoggrpPermission = new Fortios.System.Inputs.AccprofileLoggrpPermissionArgs
    {
        Config = "string",
        DataAccess = "string",
        ReportAccess = "string",
        ThreatWeight = "string",
    },
    Name = "string",
    Netgrp = "string",
    NetgrpPermission = new Fortios.System.Inputs.AccprofileNetgrpPermissionArgs
    {
        Cfg = "string",
        PacketCapture = "string",
        RouteCfg = "string",
    },
    Scope = "string",
    Secfabgrp = "string",
    Sysgrp = "string",
    SysgrpPermission = new Fortios.System.Inputs.AccprofileSysgrpPermissionArgs
    {
        Admin = "string",
        Cfg = "string",
        Mnt = "string",
        Upd = "string",
    },
    SystemDiagnostics = "string",
    SystemExecuteSsh = "string",
    SystemExecuteTelnet = "string",
    Utmgrp = "string",
    UtmgrpPermission = new Fortios.System.Inputs.AccprofileUtmgrpPermissionArgs
    {
        Antivirus = "string",
        ApplicationControl = "string",
        Casb = "string",
        DataLeakPrevention = "string",
        DataLossPrevention = "string",
        Dnsfilter = "string",
        Emailfilter = "string",
        EndpointControl = "string",
        FileFilter = "string",
        Icap = "string",
        Ips = "string",
        Spamfilter = "string",
        Videofilter = "string",
        VirtualPatch = "string",
        Voip = "string",
        Waf = "string",
        Webfilter = "string",
    },
    Vdomparam = "string",
    Vpngrp = "string",
    Wanoptgrp = "string",
    Wifi = "string",
});
example, err := system.NewAccprofile(ctx, "accprofileResource", &system.AccprofileArgs{
	Admintimeout:         pulumi.Int(0),
	AdmintimeoutOverride: pulumi.String("string"),
	Authgrp:              pulumi.String("string"),
	CliConfig:            pulumi.String("string"),
	CliDiagnose:          pulumi.String("string"),
	CliExec:              pulumi.String("string"),
	CliGet:               pulumi.String("string"),
	CliShow:              pulumi.String("string"),
	Comments:             pulumi.String("string"),
	Ftviewgrp:            pulumi.String("string"),
	Fwgrp:                pulumi.String("string"),
	FwgrpPermission: &system.AccprofileFwgrpPermissionArgs{
		Address:  pulumi.String("string"),
		Others:   pulumi.String("string"),
		Policy:   pulumi.String("string"),
		Schedule: pulumi.String("string"),
		Service:  pulumi.String("string"),
	},
	GetAllTables: pulumi.String("string"),
	Loggrp:       pulumi.String("string"),
	LoggrpPermission: &system.AccprofileLoggrpPermissionArgs{
		Config:       pulumi.String("string"),
		DataAccess:   pulumi.String("string"),
		ReportAccess: pulumi.String("string"),
		ThreatWeight: pulumi.String("string"),
	},
	Name:   pulumi.String("string"),
	Netgrp: pulumi.String("string"),
	NetgrpPermission: &system.AccprofileNetgrpPermissionArgs{
		Cfg:           pulumi.String("string"),
		PacketCapture: pulumi.String("string"),
		RouteCfg:      pulumi.String("string"),
	},
	Scope:     pulumi.String("string"),
	Secfabgrp: pulumi.String("string"),
	Sysgrp:    pulumi.String("string"),
	SysgrpPermission: &system.AccprofileSysgrpPermissionArgs{
		Admin: pulumi.String("string"),
		Cfg:   pulumi.String("string"),
		Mnt:   pulumi.String("string"),
		Upd:   pulumi.String("string"),
	},
	SystemDiagnostics:   pulumi.String("string"),
	SystemExecuteSsh:    pulumi.String("string"),
	SystemExecuteTelnet: pulumi.String("string"),
	Utmgrp:              pulumi.String("string"),
	UtmgrpPermission: &system.AccprofileUtmgrpPermissionArgs{
		Antivirus:          pulumi.String("string"),
		ApplicationControl: pulumi.String("string"),
		Casb:               pulumi.String("string"),
		DataLeakPrevention: pulumi.String("string"),
		DataLossPrevention: pulumi.String("string"),
		Dnsfilter:          pulumi.String("string"),
		Emailfilter:        pulumi.String("string"),
		EndpointControl:    pulumi.String("string"),
		FileFilter:         pulumi.String("string"),
		Icap:               pulumi.String("string"),
		Ips:                pulumi.String("string"),
		Spamfilter:         pulumi.String("string"),
		Videofilter:        pulumi.String("string"),
		VirtualPatch:       pulumi.String("string"),
		Voip:               pulumi.String("string"),
		Waf:                pulumi.String("string"),
		Webfilter:          pulumi.String("string"),
	},
	Vdomparam: pulumi.String("string"),
	Vpngrp:    pulumi.String("string"),
	Wanoptgrp: pulumi.String("string"),
	Wifi:      pulumi.String("string"),
})
var accprofileResource = new Accprofile("accprofileResource", AccprofileArgs.builder()
    .admintimeout(0)
    .admintimeoutOverride("string")
    .authgrp("string")
    .cliConfig("string")
    .cliDiagnose("string")
    .cliExec("string")
    .cliGet("string")
    .cliShow("string")
    .comments("string")
    .ftviewgrp("string")
    .fwgrp("string")
    .fwgrpPermission(AccprofileFwgrpPermissionArgs.builder()
        .address("string")
        .others("string")
        .policy("string")
        .schedule("string")
        .service("string")
        .build())
    .getAllTables("string")
    .loggrp("string")
    .loggrpPermission(AccprofileLoggrpPermissionArgs.builder()
        .config("string")
        .dataAccess("string")
        .reportAccess("string")
        .threatWeight("string")
        .build())
    .name("string")
    .netgrp("string")
    .netgrpPermission(AccprofileNetgrpPermissionArgs.builder()
        .cfg("string")
        .packetCapture("string")
        .routeCfg("string")
        .build())
    .scope("string")
    .secfabgrp("string")
    .sysgrp("string")
    .sysgrpPermission(AccprofileSysgrpPermissionArgs.builder()
        .admin("string")
        .cfg("string")
        .mnt("string")
        .upd("string")
        .build())
    .systemDiagnostics("string")
    .systemExecuteSsh("string")
    .systemExecuteTelnet("string")
    .utmgrp("string")
    .utmgrpPermission(AccprofileUtmgrpPermissionArgs.builder()
        .antivirus("string")
        .applicationControl("string")
        .casb("string")
        .dataLeakPrevention("string")
        .dataLossPrevention("string")
        .dnsfilter("string")
        .emailfilter("string")
        .endpointControl("string")
        .fileFilter("string")
        .icap("string")
        .ips("string")
        .spamfilter("string")
        .videofilter("string")
        .virtualPatch("string")
        .voip("string")
        .waf("string")
        .webfilter("string")
        .build())
    .vdomparam("string")
    .vpngrp("string")
    .wanoptgrp("string")
    .wifi("string")
    .build());
accprofile_resource = fortios.system.Accprofile("accprofileResource",
    admintimeout=0,
    admintimeout_override="string",
    authgrp="string",
    cli_config="string",
    cli_diagnose="string",
    cli_exec="string",
    cli_get="string",
    cli_show="string",
    comments="string",
    ftviewgrp="string",
    fwgrp="string",
    fwgrp_permission=fortios.system.AccprofileFwgrpPermissionArgs(
        address="string",
        others="string",
        policy="string",
        schedule="string",
        service="string",
    ),
    get_all_tables="string",
    loggrp="string",
    loggrp_permission=fortios.system.AccprofileLoggrpPermissionArgs(
        config="string",
        data_access="string",
        report_access="string",
        threat_weight="string",
    ),
    name="string",
    netgrp="string",
    netgrp_permission=fortios.system.AccprofileNetgrpPermissionArgs(
        cfg="string",
        packet_capture="string",
        route_cfg="string",
    ),
    scope="string",
    secfabgrp="string",
    sysgrp="string",
    sysgrp_permission=fortios.system.AccprofileSysgrpPermissionArgs(
        admin="string",
        cfg="string",
        mnt="string",
        upd="string",
    ),
    system_diagnostics="string",
    system_execute_ssh="string",
    system_execute_telnet="string",
    utmgrp="string",
    utmgrp_permission=fortios.system.AccprofileUtmgrpPermissionArgs(
        antivirus="string",
        application_control="string",
        casb="string",
        data_leak_prevention="string",
        data_loss_prevention="string",
        dnsfilter="string",
        emailfilter="string",
        endpoint_control="string",
        file_filter="string",
        icap="string",
        ips="string",
        spamfilter="string",
        videofilter="string",
        virtual_patch="string",
        voip="string",
        waf="string",
        webfilter="string",
    ),
    vdomparam="string",
    vpngrp="string",
    wanoptgrp="string",
    wifi="string")
const accprofileResource = new fortios.system.Accprofile("accprofileResource", {
    admintimeout: 0,
    admintimeoutOverride: "string",
    authgrp: "string",
    cliConfig: "string",
    cliDiagnose: "string",
    cliExec: "string",
    cliGet: "string",
    cliShow: "string",
    comments: "string",
    ftviewgrp: "string",
    fwgrp: "string",
    fwgrpPermission: {
        address: "string",
        others: "string",
        policy: "string",
        schedule: "string",
        service: "string",
    },
    getAllTables: "string",
    loggrp: "string",
    loggrpPermission: {
        config: "string",
        dataAccess: "string",
        reportAccess: "string",
        threatWeight: "string",
    },
    name: "string",
    netgrp: "string",
    netgrpPermission: {
        cfg: "string",
        packetCapture: "string",
        routeCfg: "string",
    },
    scope: "string",
    secfabgrp: "string",
    sysgrp: "string",
    sysgrpPermission: {
        admin: "string",
        cfg: "string",
        mnt: "string",
        upd: "string",
    },
    systemDiagnostics: "string",
    systemExecuteSsh: "string",
    systemExecuteTelnet: "string",
    utmgrp: "string",
    utmgrpPermission: {
        antivirus: "string",
        applicationControl: "string",
        casb: "string",
        dataLeakPrevention: "string",
        dataLossPrevention: "string",
        dnsfilter: "string",
        emailfilter: "string",
        endpointControl: "string",
        fileFilter: "string",
        icap: "string",
        ips: "string",
        spamfilter: "string",
        videofilter: "string",
        virtualPatch: "string",
        voip: "string",
        waf: "string",
        webfilter: "string",
    },
    vdomparam: "string",
    vpngrp: "string",
    wanoptgrp: "string",
    wifi: "string",
});
type: fortios:system:Accprofile
properties:
    admintimeout: 0
    admintimeoutOverride: string
    authgrp: string
    cliConfig: string
    cliDiagnose: string
    cliExec: string
    cliGet: string
    cliShow: string
    comments: string
    ftviewgrp: string
    fwgrp: string
    fwgrpPermission:
        address: string
        others: string
        policy: string
        schedule: string
        service: string
    getAllTables: string
    loggrp: string
    loggrpPermission:
        config: string
        dataAccess: string
        reportAccess: string
        threatWeight: string
    name: string
    netgrp: string
    netgrpPermission:
        cfg: string
        packetCapture: string
        routeCfg: string
    scope: string
    secfabgrp: string
    sysgrp: string
    sysgrpPermission:
        admin: string
        cfg: string
        mnt: string
        upd: string
    systemDiagnostics: string
    systemExecuteSsh: string
    systemExecuteTelnet: string
    utmgrp: string
    utmgrpPermission:
        antivirus: string
        applicationControl: string
        casb: string
        dataLeakPrevention: string
        dataLossPrevention: string
        dnsfilter: string
        emailfilter: string
        endpointControl: string
        fileFilter: string
        icap: string
        ips: string
        spamfilter: string
        videofilter: string
        virtualPatch: string
        voip: string
        waf: string
        webfilter: string
    vdomparam: string
    vpngrp: string
    wanoptgrp: string
    wifi: string
Accprofile Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Accprofile resource accepts the following input properties:
- Admintimeout int
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - Authgrp string
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - Cli
Config string - Enable/disable permission to run config commands. Valid values: 
enable,disable. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - Cli
Get string - Enable/disable permission to run get commands. Valid values: 
enable,disable. - Cli
Show string - Enable/disable permission to run show commands. Valid values: 
enable,disable. - Comments string
 - Comment.
 - Ftviewgrp string
 - FortiView. Valid values: 
none,read,read-write. - Fwgrp string
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - Fwgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Fwgrp Permission  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - Get
All stringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - Loggrp string
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - Loggrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Loggrp Permission  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - Name string
 - Profile name.
 - Netgrp string
 - Network Configuration. Valid values: 
none,read,read-write,custom. - Netgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Netgrp Permission  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - Scope string
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - Secfabgrp string
 - Security Fabric. Valid values: 
none,read,read-write. - Sysgrp string
 - System Configuration. Valid values: 
none,read,read-write,custom. - Sysgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Sysgrp Permission  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - System
Execute stringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - System
Execute stringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - Utmgrp string
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - Utmgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Utmgrp Permission  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - Vdomparam string
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - Vpngrp string
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - Wanoptgrp string
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - Wifi string
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- Admintimeout int
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - Authgrp string
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - Cli
Config string - Enable/disable permission to run config commands. Valid values: 
enable,disable. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - Cli
Get string - Enable/disable permission to run get commands. Valid values: 
enable,disable. - Cli
Show string - Enable/disable permission to run show commands. Valid values: 
enable,disable. - Comments string
 - Comment.
 - Ftviewgrp string
 - FortiView. Valid values: 
none,read,read-write. - Fwgrp string
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - Fwgrp
Permission AccprofileFwgrp Permission Args  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - Get
All stringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - Loggrp string
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - Loggrp
Permission AccprofileLoggrp Permission Args  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - Name string
 - Profile name.
 - Netgrp string
 - Network Configuration. Valid values: 
none,read,read-write,custom. - Netgrp
Permission AccprofileNetgrp Permission Args  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - Scope string
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - Secfabgrp string
 - Security Fabric. Valid values: 
none,read,read-write. - Sysgrp string
 - System Configuration. Valid values: 
none,read,read-write,custom. - Sysgrp
Permission AccprofileSysgrp Permission Args  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - System
Execute stringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - System
Execute stringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - Utmgrp string
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - Utmgrp
Permission AccprofileUtmgrp Permission Args  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - Vdomparam string
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - Vpngrp string
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - Wanoptgrp string
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - Wifi string
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout Integer
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp String
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli
Config String - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli
Exec String - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli
Get String - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli
Show String - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments String
 - Comment.
 - ftviewgrp String
 - FortiView. Valid values: 
none,read,read-write. - fwgrp String
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp
Permission AccprofileFwgrp Permission  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get
All StringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp String
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp
Permission AccprofileLoggrp Permission  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name String
 - Profile name.
 - netgrp String
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp
Permission AccprofileNetgrp Permission  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope String
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp String
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp String
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp
Permission AccprofileSysgrp Permission  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system
Execute StringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system
Execute StringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp String
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp
Permission AccprofileUtmgrp Permission  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam String
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp String
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp String
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi String
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout number
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp string
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli
Config string - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli
Exec string - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli
Get string - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli
Show string - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments string
 - Comment.
 - ftviewgrp string
 - FortiView. Valid values: 
none,read,read-write. - fwgrp string
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp
Permission AccprofileFwgrp Permission  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get
All stringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp string
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp
Permission AccprofileLoggrp Permission  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name string
 - Profile name.
 - netgrp string
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp
Permission AccprofileNetgrp Permission  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope string
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp string
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp string
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp
Permission AccprofileSysgrp Permission  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system
Execute stringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system
Execute stringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp string
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp
Permission AccprofileUtmgrp Permission  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam string
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp string
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp string
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi string
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout int
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout_
override str - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp str
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli_
config str - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli_
diagnose str - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli_
exec str - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli_
get str - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli_
show str - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments str
 - Comment.
 - ftviewgrp str
 - FortiView. Valid values: 
none,read,read-write. - fwgrp str
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp_
permission AccprofileFwgrp Permission Args  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get_
all_ strtables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp str
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp_
permission AccprofileLoggrp Permission Args  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name str
 - Profile name.
 - netgrp str
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp_
permission AccprofileNetgrp Permission Args  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope str
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp str
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp str
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp_
permission AccprofileSysgrp Permission Args  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system_
diagnostics str - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system_
execute_ strssh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system_
execute_ strtelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp str
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp_
permission AccprofileUtmgrp Permission Args  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam str
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp str
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp str
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi str
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout Number
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp String
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli
Config String - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli
Exec String - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli
Get String - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli
Show String - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments String
 - Comment.
 - ftviewgrp String
 - FortiView. Valid values: 
none,read,read-write. - fwgrp String
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp
Permission Property Map - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get
All StringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp String
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp
Permission Property Map - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name String
 - Profile name.
 - netgrp String
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp
Permission Property Map - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope String
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp String
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp String
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp
Permission Property Map - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system
Execute StringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system
Execute StringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp String
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp
Permission Property Map - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam String
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp String
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp String
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi String
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
Outputs
All input properties are implicitly available as output properties. Additionally, the Accprofile resource produces the following output properties:
- Id string
 - The provider-assigned unique ID for this managed resource.
 
- Id string
 - The provider-assigned unique ID for this managed resource.
 
- id String
 - The provider-assigned unique ID for this managed resource.
 
- id string
 - The provider-assigned unique ID for this managed resource.
 
- id str
 - The provider-assigned unique ID for this managed resource.
 
- id String
 - The provider-assigned unique ID for this managed resource.
 
Look up Existing Accprofile Resource
Get an existing Accprofile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AccprofileState, opts?: CustomResourceOptions): Accprofile@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        admintimeout: Optional[int] = None,
        admintimeout_override: Optional[str] = None,
        authgrp: Optional[str] = None,
        cli_config: Optional[str] = None,
        cli_diagnose: Optional[str] = None,
        cli_exec: Optional[str] = None,
        cli_get: Optional[str] = None,
        cli_show: Optional[str] = None,
        comments: Optional[str] = None,
        ftviewgrp: Optional[str] = None,
        fwgrp: Optional[str] = None,
        fwgrp_permission: Optional[AccprofileFwgrpPermissionArgs] = None,
        get_all_tables: Optional[str] = None,
        loggrp: Optional[str] = None,
        loggrp_permission: Optional[AccprofileLoggrpPermissionArgs] = None,
        name: Optional[str] = None,
        netgrp: Optional[str] = None,
        netgrp_permission: Optional[AccprofileNetgrpPermissionArgs] = None,
        scope: Optional[str] = None,
        secfabgrp: Optional[str] = None,
        sysgrp: Optional[str] = None,
        sysgrp_permission: Optional[AccprofileSysgrpPermissionArgs] = None,
        system_diagnostics: Optional[str] = None,
        system_execute_ssh: Optional[str] = None,
        system_execute_telnet: Optional[str] = None,
        utmgrp: Optional[str] = None,
        utmgrp_permission: Optional[AccprofileUtmgrpPermissionArgs] = None,
        vdomparam: Optional[str] = None,
        vpngrp: Optional[str] = None,
        wanoptgrp: Optional[str] = None,
        wifi: Optional[str] = None) -> Accprofilefunc GetAccprofile(ctx *Context, name string, id IDInput, state *AccprofileState, opts ...ResourceOption) (*Accprofile, error)public static Accprofile Get(string name, Input<string> id, AccprofileState? state, CustomResourceOptions? opts = null)public static Accprofile get(String name, Output<String> id, AccprofileState state, CustomResourceOptions options)Resource lookup is not supported in YAML- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- resource_name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- Admintimeout int
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - Authgrp string
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - Cli
Config string - Enable/disable permission to run config commands. Valid values: 
enable,disable. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - Cli
Get string - Enable/disable permission to run get commands. Valid values: 
enable,disable. - Cli
Show string - Enable/disable permission to run show commands. Valid values: 
enable,disable. - Comments string
 - Comment.
 - Ftviewgrp string
 - FortiView. Valid values: 
none,read,read-write. - Fwgrp string
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - Fwgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Fwgrp Permission  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - Get
All stringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - Loggrp string
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - Loggrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Loggrp Permission  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - Name string
 - Profile name.
 - Netgrp string
 - Network Configuration. Valid values: 
none,read,read-write,custom. - Netgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Netgrp Permission  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - Scope string
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - Secfabgrp string
 - Security Fabric. Valid values: 
none,read,read-write. - Sysgrp string
 - System Configuration. Valid values: 
none,read,read-write,custom. - Sysgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Sysgrp Permission  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - System
Execute stringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - System
Execute stringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - Utmgrp string
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - Utmgrp
Permission Pulumiverse.Fortios. System. Inputs. Accprofile Utmgrp Permission  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - Vdomparam string
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - Vpngrp string
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - Wanoptgrp string
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - Wifi string
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- Admintimeout int
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - Admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - Authgrp string
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - Cli
Config string - Enable/disable permission to run config commands. Valid values: 
enable,disable. - Cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - Cli
Exec string - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - Cli
Get string - Enable/disable permission to run get commands. Valid values: 
enable,disable. - Cli
Show string - Enable/disable permission to run show commands. Valid values: 
enable,disable. - Comments string
 - Comment.
 - Ftviewgrp string
 - FortiView. Valid values: 
none,read,read-write. - Fwgrp string
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - Fwgrp
Permission AccprofileFwgrp Permission Args  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - Get
All stringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - Loggrp string
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - Loggrp
Permission AccprofileLoggrp Permission Args  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - Name string
 - Profile name.
 - Netgrp string
 - Network Configuration. Valid values: 
none,read,read-write,custom. - Netgrp
Permission AccprofileNetgrp Permission Args  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - Scope string
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - Secfabgrp string
 - Security Fabric. Valid values: 
none,read,read-write. - Sysgrp string
 - System Configuration. Valid values: 
none,read,read-write,custom. - Sysgrp
Permission AccprofileSysgrp Permission Args  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - System
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - System
Execute stringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - System
Execute stringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - Utmgrp string
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - Utmgrp
Permission AccprofileUtmgrp Permission Args  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - Vdomparam string
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - Vpngrp string
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - Wanoptgrp string
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - Wifi string
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout Integer
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp String
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli
Config String - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli
Exec String - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli
Get String - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli
Show String - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments String
 - Comment.
 - ftviewgrp String
 - FortiView. Valid values: 
none,read,read-write. - fwgrp String
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp
Permission AccprofileFwgrp Permission  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get
All StringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp String
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp
Permission AccprofileLoggrp Permission  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name String
 - Profile name.
 - netgrp String
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp
Permission AccprofileNetgrp Permission  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope String
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp String
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp String
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp
Permission AccprofileSysgrp Permission  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system
Execute StringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system
Execute StringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp String
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp
Permission AccprofileUtmgrp Permission  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam String
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp String
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp String
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi String
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout number
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout
Override string - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp string
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli
Config string - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli
Diagnose string - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli
Exec string - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli
Get string - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli
Show string - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments string
 - Comment.
 - ftviewgrp string
 - FortiView. Valid values: 
none,read,read-write. - fwgrp string
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp
Permission AccprofileFwgrp Permission  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get
All stringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp string
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp
Permission AccprofileLoggrp Permission  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name string
 - Profile name.
 - netgrp string
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp
Permission AccprofileNetgrp Permission  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope string
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp string
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp string
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp
Permission AccprofileSysgrp Permission  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system
Diagnostics string - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system
Execute stringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system
Execute stringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp string
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp
Permission AccprofileUtmgrp Permission  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam string
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp string
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp string
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi string
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout int
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout_
override str - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp str
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli_
config str - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli_
diagnose str - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli_
exec str - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli_
get str - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli_
show str - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments str
 - Comment.
 - ftviewgrp str
 - FortiView. Valid values: 
none,read,read-write. - fwgrp str
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp_
permission AccprofileFwgrp Permission Args  - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get_
all_ strtables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp str
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp_
permission AccprofileLoggrp Permission Args  - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name str
 - Profile name.
 - netgrp str
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp_
permission AccprofileNetgrp Permission Args  - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope str
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp str
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp str
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp_
permission AccprofileSysgrp Permission Args  - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system_
diagnostics str - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system_
execute_ strssh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system_
execute_ strtelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp str
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp_
permission AccprofileUtmgrp Permission Args  - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam str
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp str
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp str
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi str
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
- admintimeout Number
 - Administrator timeout for this access profile (0 - 480 min, default = 10, 0 means never timeout).
 - admintimeout
Override String - Enable/disable overriding the global administrator idle timeout. Valid values: 
enable,disable. - authgrp String
 - Administrator access to Users and Devices. Valid values: 
none,read,read-write. - cli
Config String - Enable/disable permission to run config commands. Valid values: 
enable,disable. - cli
Diagnose String - Enable/disable permission to run diagnostic commands. Valid values: 
enable,disable. - cli
Exec String - Enable/disable permission to run execute commands. Valid values: 
enable,disable. - cli
Get String - Enable/disable permission to run get commands. Valid values: 
enable,disable. - cli
Show String - Enable/disable permission to run show commands. Valid values: 
enable,disable. - comments String
 - Comment.
 - ftviewgrp String
 - FortiView. Valid values: 
none,read,read-write. - fwgrp String
 - Administrator access to the Firewall configuration. Valid values: 
none,read,read-write,custom. - fwgrp
Permission Property Map - Custom firewall permission. The structure of 
fwgrp_permissionblock is documented below. - get
All StringTables  - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
 - loggrp String
 - Administrator access to Logging and Reporting including viewing log messages. Valid values: 
none,read,read-write,custom. - loggrp
Permission Property Map - Custom Log & Report permission. The structure of 
loggrp_permissionblock is documented below. - name String
 - Profile name.
 - netgrp String
 - Network Configuration. Valid values: 
none,read,read-write,custom. - netgrp
Permission Property Map - Custom network permission. The structure of 
netgrp_permissionblock is documented below. - scope String
 - Scope of admin access: global or specific VDOM(s). Valid values: 
vdom,global. - secfabgrp String
 - Security Fabric. Valid values: 
none,read,read-write. - sysgrp String
 - System Configuration. Valid values: 
none,read,read-write,custom. - sysgrp
Permission Property Map - Custom system permission. The structure of 
sysgrp_permissionblock is documented below. - system
Diagnostics String - Enable/disable permission to run system diagnostic commands. Valid values: 
enable,disable. - system
Execute StringSsh  - Enable/disable permission to execute SSH commands. Valid values: 
enable,disable. - system
Execute StringTelnet  - Enable/disable permission to execute TELNET commands. Valid values: 
enable,disable. - utmgrp String
 - Administrator access to Security Profiles. Valid values: 
none,read,read-write,custom. - utmgrp
Permission Property Map - Custom Security Profile permissions. The structure of 
utmgrp_permissionblock is documented below. - vdomparam String
 - Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
 - vpngrp String
 - Administrator access to IPsec, SSL, PPTP, and L2TP VPN. Valid values: 
none,read,read-write. - wanoptgrp String
 - Administrator access to WAN Opt & Cache. Valid values: 
none,read,read-write. - wifi String
 - Administrator access to the WiFi controller and Switch controller. Valid values: 
none,read,read-write. 
Supporting Types
AccprofileFwgrpPermission, AccprofileFwgrpPermissionArgs      
- Address string
 - Address Configuration. Valid values: 
none,read,read-write. - Others string
 - Other Firewall Configuration. Valid values: 
none,read,read-write. - Policy string
 - Policy Configuration. Valid values: 
none,read,read-write. - Schedule string
 - Schedule Configuration. Valid values: 
none,read,read-write. - Service string
 - Service Configuration. Valid values: 
none,read,read-write. 
- Address string
 - Address Configuration. Valid values: 
none,read,read-write. - Others string
 - Other Firewall Configuration. Valid values: 
none,read,read-write. - Policy string
 - Policy Configuration. Valid values: 
none,read,read-write. - Schedule string
 - Schedule Configuration. Valid values: 
none,read,read-write. - Service string
 - Service Configuration. Valid values: 
none,read,read-write. 
- address String
 - Address Configuration. Valid values: 
none,read,read-write. - others String
 - Other Firewall Configuration. Valid values: 
none,read,read-write. - policy String
 - Policy Configuration. Valid values: 
none,read,read-write. - schedule String
 - Schedule Configuration. Valid values: 
none,read,read-write. - service String
 - Service Configuration. Valid values: 
none,read,read-write. 
- address string
 - Address Configuration. Valid values: 
none,read,read-write. - others string
 - Other Firewall Configuration. Valid values: 
none,read,read-write. - policy string
 - Policy Configuration. Valid values: 
none,read,read-write. - schedule string
 - Schedule Configuration. Valid values: 
none,read,read-write. - service string
 - Service Configuration. Valid values: 
none,read,read-write. 
- address str
 - Address Configuration. Valid values: 
none,read,read-write. - others str
 - Other Firewall Configuration. Valid values: 
none,read,read-write. - policy str
 - Policy Configuration. Valid values: 
none,read,read-write. - schedule str
 - Schedule Configuration. Valid values: 
none,read,read-write. - service str
 - Service Configuration. Valid values: 
none,read,read-write. 
- address String
 - Address Configuration. Valid values: 
none,read,read-write. - others String
 - Other Firewall Configuration. Valid values: 
none,read,read-write. - policy String
 - Policy Configuration. Valid values: 
none,read,read-write. - schedule String
 - Schedule Configuration. Valid values: 
none,read,read-write. - service String
 - Service Configuration. Valid values: 
none,read,read-write. 
AccprofileLoggrpPermission, AccprofileLoggrpPermissionArgs      
- Config string
 - Log & Report configuration. Valid values: 
none,read,read-write. - Data
Access string - Log & Report Data Access. Valid values: 
none,read,read-write. - Report
Access string - Log & Report Report Access. Valid values: 
none,read,read-write. - Threat
Weight string - Log & Report Threat Weight. Valid values: 
none,read,read-write. 
- Config string
 - Log & Report configuration. Valid values: 
none,read,read-write. - Data
Access string - Log & Report Data Access. Valid values: 
none,read,read-write. - Report
Access string - Log & Report Report Access. Valid values: 
none,read,read-write. - Threat
Weight string - Log & Report Threat Weight. Valid values: 
none,read,read-write. 
- config String
 - Log & Report configuration. Valid values: 
none,read,read-write. - data
Access String - Log & Report Data Access. Valid values: 
none,read,read-write. - report
Access String - Log & Report Report Access. Valid values: 
none,read,read-write. - threat
Weight String - Log & Report Threat Weight. Valid values: 
none,read,read-write. 
- config string
 - Log & Report configuration. Valid values: 
none,read,read-write. - data
Access string - Log & Report Data Access. Valid values: 
none,read,read-write. - report
Access string - Log & Report Report Access. Valid values: 
none,read,read-write. - threat
Weight string - Log & Report Threat Weight. Valid values: 
none,read,read-write. 
- config str
 - Log & Report configuration. Valid values: 
none,read,read-write. - data_
access str - Log & Report Data Access. Valid values: 
none,read,read-write. - report_
access str - Log & Report Report Access. Valid values: 
none,read,read-write. - threat_
weight str - Log & Report Threat Weight. Valid values: 
none,read,read-write. 
- config String
 - Log & Report configuration. Valid values: 
none,read,read-write. - data
Access String - Log & Report Data Access. Valid values: 
none,read,read-write. - report
Access String - Log & Report Report Access. Valid values: 
none,read,read-write. - threat
Weight String - Log & Report Threat Weight. Valid values: 
none,read,read-write. 
AccprofileNetgrpPermission, AccprofileNetgrpPermissionArgs      
- Cfg string
 - Network Configuration. Valid values: 
none,read,read-write. - Packet
Capture string - Packet Capture Configuration. Valid values: 
none,read,read-write. - Route
Cfg string - Router Configuration. Valid values: 
none,read,read-write. 
- Cfg string
 - Network Configuration. Valid values: 
none,read,read-write. - Packet
Capture string - Packet Capture Configuration. Valid values: 
none,read,read-write. - Route
Cfg string - Router Configuration. Valid values: 
none,read,read-write. 
- cfg String
 - Network Configuration. Valid values: 
none,read,read-write. - packet
Capture String - Packet Capture Configuration. Valid values: 
none,read,read-write. - route
Cfg String - Router Configuration. Valid values: 
none,read,read-write. 
- cfg string
 - Network Configuration. Valid values: 
none,read,read-write. - packet
Capture string - Packet Capture Configuration. Valid values: 
none,read,read-write. - route
Cfg string - Router Configuration. Valid values: 
none,read,read-write. 
- cfg str
 - Network Configuration. Valid values: 
none,read,read-write. - packet_
capture str - Packet Capture Configuration. Valid values: 
none,read,read-write. - route_
cfg str - Router Configuration. Valid values: 
none,read,read-write. 
- cfg String
 - Network Configuration. Valid values: 
none,read,read-write. - packet
Capture String - Packet Capture Configuration. Valid values: 
none,read,read-write. - route
Cfg String - Router Configuration. Valid values: 
none,read,read-write. 
AccprofileSysgrpPermission, AccprofileSysgrpPermissionArgs      
AccprofileUtmgrpPermission, AccprofileUtmgrpPermissionArgs      
- Antivirus string
 - Antivirus profiles and settings. Valid values: 
none,read,read-write. - Application
Control string - Application Control profiles and settings. Valid values: 
none,read,read-write. - Casb string
 - Inline CASB filter profile and settings Valid values: 
none,read,read-write. - Data
Leak stringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - Data
Loss stringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - Dnsfilter string
 - DNS Filter profiles and settings. Valid values: 
none,read,read-write. - Emailfilter string
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - Endpoint
Control string - FortiClient Profiles. Valid values: 
none,read,read-write. - File
Filter string - File-filter profiles and settings. Valid values: 
none,read,read-write. - Icap string
 - ICAP profiles and settings. Valid values: 
none,read,read-write. - Ips string
 - IPS profiles and settings. Valid values: 
none,read,read-write. - Spamfilter string
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - Videofilter string
 - Video filter profiles and settings. Valid values: 
none,read,read-write. - Virtual
Patch string - Virtual patch profiles and settings. Valid values: 
none,read,read-write. - Voip string
 - VoIP profiles and settings. Valid values: 
none,read,read-write. - Waf string
 - Web Application Firewall profiles and settings. Valid values: 
none,read,read-write. - Webfilter string
 - Web Filter profiles and settings. Valid values: 
none,read,read-write. 
- Antivirus string
 - Antivirus profiles and settings. Valid values: 
none,read,read-write. - Application
Control string - Application Control profiles and settings. Valid values: 
none,read,read-write. - Casb string
 - Inline CASB filter profile and settings Valid values: 
none,read,read-write. - Data
Leak stringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - Data
Loss stringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - Dnsfilter string
 - DNS Filter profiles and settings. Valid values: 
none,read,read-write. - Emailfilter string
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - Endpoint
Control string - FortiClient Profiles. Valid values: 
none,read,read-write. - File
Filter string - File-filter profiles and settings. Valid values: 
none,read,read-write. - Icap string
 - ICAP profiles and settings. Valid values: 
none,read,read-write. - Ips string
 - IPS profiles and settings. Valid values: 
none,read,read-write. - Spamfilter string
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - Videofilter string
 - Video filter profiles and settings. Valid values: 
none,read,read-write. - Virtual
Patch string - Virtual patch profiles and settings. Valid values: 
none,read,read-write. - Voip string
 - VoIP profiles and settings. Valid values: 
none,read,read-write. - Waf string
 - Web Application Firewall profiles and settings. Valid values: 
none,read,read-write. - Webfilter string
 - Web Filter profiles and settings. Valid values: 
none,read,read-write. 
- antivirus String
 - Antivirus profiles and settings. Valid values: 
none,read,read-write. - application
Control String - Application Control profiles and settings. Valid values: 
none,read,read-write. - casb String
 - Inline CASB filter profile and settings Valid values: 
none,read,read-write. - data
Leak StringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - data
Loss StringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - dnsfilter String
 - DNS Filter profiles and settings. Valid values: 
none,read,read-write. - emailfilter String
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - endpoint
Control String - FortiClient Profiles. Valid values: 
none,read,read-write. - file
Filter String - File-filter profiles and settings. Valid values: 
none,read,read-write. - icap String
 - ICAP profiles and settings. Valid values: 
none,read,read-write. - ips String
 - IPS profiles and settings. Valid values: 
none,read,read-write. - spamfilter String
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - videofilter String
 - Video filter profiles and settings. Valid values: 
none,read,read-write. - virtual
Patch String - Virtual patch profiles and settings. Valid values: 
none,read,read-write. - voip String
 - VoIP profiles and settings. Valid values: 
none,read,read-write. - waf String
 - Web Application Firewall profiles and settings. Valid values: 
none,read,read-write. - webfilter String
 - Web Filter profiles and settings. Valid values: 
none,read,read-write. 
- antivirus string
 - Antivirus profiles and settings. Valid values: 
none,read,read-write. - application
Control string - Application Control profiles and settings. Valid values: 
none,read,read-write. - casb string
 - Inline CASB filter profile and settings Valid values: 
none,read,read-write. - data
Leak stringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - data
Loss stringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - dnsfilter string
 - DNS Filter profiles and settings. Valid values: 
none,read,read-write. - emailfilter string
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - endpoint
Control string - FortiClient Profiles. Valid values: 
none,read,read-write. - file
Filter string - File-filter profiles and settings. Valid values: 
none,read,read-write. - icap string
 - ICAP profiles and settings. Valid values: 
none,read,read-write. - ips string
 - IPS profiles and settings. Valid values: 
none,read,read-write. - spamfilter string
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - videofilter string
 - Video filter profiles and settings. Valid values: 
none,read,read-write. - virtual
Patch string - Virtual patch profiles and settings. Valid values: 
none,read,read-write. - voip string
 - VoIP profiles and settings. Valid values: 
none,read,read-write. - waf string
 - Web Application Firewall profiles and settings. Valid values: 
none,read,read-write. - webfilter string
 - Web Filter profiles and settings. Valid values: 
none,read,read-write. 
- antivirus str
 - Antivirus profiles and settings. Valid values: 
none,read,read-write. - application_
control str - Application Control profiles and settings. Valid values: 
none,read,read-write. - casb str
 - Inline CASB filter profile and settings Valid values: 
none,read,read-write. - data_
leak_ strprevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - data_
loss_ strprevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - dnsfilter str
 - DNS Filter profiles and settings. Valid values: 
none,read,read-write. - emailfilter str
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - endpoint_
control str - FortiClient Profiles. Valid values: 
none,read,read-write. - file_
filter str - File-filter profiles and settings. Valid values: 
none,read,read-write. - icap str
 - ICAP profiles and settings. Valid values: 
none,read,read-write. - ips str
 - IPS profiles and settings. Valid values: 
none,read,read-write. - spamfilter str
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - videofilter str
 - Video filter profiles and settings. Valid values: 
none,read,read-write. - virtual_
patch str - Virtual patch profiles and settings. Valid values: 
none,read,read-write. - voip str
 - VoIP profiles and settings. Valid values: 
none,read,read-write. - waf str
 - Web Application Firewall profiles and settings. Valid values: 
none,read,read-write. - webfilter str
 - Web Filter profiles and settings. Valid values: 
none,read,read-write. 
- antivirus String
 - Antivirus profiles and settings. Valid values: 
none,read,read-write. - application
Control String - Application Control profiles and settings. Valid values: 
none,read,read-write. - casb String
 - Inline CASB filter profile and settings Valid values: 
none,read,read-write. - data
Leak StringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - data
Loss StringPrevention  - DLP profiles and settings. Valid values: 
none,read,read-write. - dnsfilter String
 - DNS Filter profiles and settings. Valid values: 
none,read,read-write. - emailfilter String
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - endpoint
Control String - FortiClient Profiles. Valid values: 
none,read,read-write. - file
Filter String - File-filter profiles and settings. Valid values: 
none,read,read-write. - icap String
 - ICAP profiles and settings. Valid values: 
none,read,read-write. - ips String
 - IPS profiles and settings. Valid values: 
none,read,read-write. - spamfilter String
 - AntiSpam filter and settings. Valid values: 
none,read,read-write. - videofilter String
 - Video filter profiles and settings. Valid values: 
none,read,read-write. - virtual
Patch String - Virtual patch profiles and settings. Valid values: 
none,read,read-write. - voip String
 - VoIP profiles and settings. Valid values: 
none,read,read-write. - waf String
 - Web Application Firewall profiles and settings. Valid values: 
none,read,read-write. - webfilter String
 - Web Filter profiles and settings. Valid values: 
none,read,read-write. 
Import
System Accprofile can be imported using any of these accepted formats:
$ pulumi import fortios:system/accprofile:Accprofile labelname {{name}}
If you do not want to import arguments of block:
$ export “FORTIOS_IMPORT_TABLE”=“false”
$ pulumi import fortios:system/accprofile:Accprofile labelname {{name}}
$ unset “FORTIOS_IMPORT_TABLE”
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
 - fortios pulumiverse/pulumi-fortios
 - License
 - Apache-2.0
 - Notes
 - This Pulumi package is based on the 
fortiosTerraform Provider.