Files
elasticsearch-js/docs/reference-security-update_api_key.asciidoc
2024-12-05 14:46:51 -06:00

76 lines
5.2 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[[reference-security-update_api_key]]
////////
===========================================================================================================================
|| ||
|| ||
|| ||
|| ██████╗ ███████╗ █████╗ ██████╗ ███╗ ███╗███████╗ ||
|| ██╔══██╗██╔════╝██╔══██╗██╔══██╗████╗ ████║██╔════╝ ||
|| ██████╔╝█████╗ ███████║██║ ██║██╔████╔██║█████╗ ||
|| ██╔══██╗██╔══╝ ██╔══██║██║ ██║██║╚██╔╝██║██╔══╝ ||
|| ██║ ██║███████╗██║ ██║██████╔╝██║ ╚═╝ ██║███████╗ ||
|| ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚═════╝ ╚═╝ ╚═╝╚══════╝ ||
|| ||
|| ||
|| This file is autogenerated, DO NOT send pull requests that changes this file directly. ||
|| You should update the script that does the generation, which can be found in: ||
|| https://github.com/elastic/elastic-client-generator-js ||
|| ||
|| You can run the script with the following command: ||
|| npm run elasticsearch -- --version <version> ||
|| ||
|| ||
|| ||
===========================================================================================================================
////////
[discrete]
=== client.security.updateApiKey
Update an API key. Updates attributes of an existing API key. Users can only update API keys that they created or that were granted to them. Use this API to update API keys created by the create API Key or grant API Key APIs. If you need to apply the same update to many API keys, you can use bulk update API Keys to reduce overhead. Its not possible to update expired API keys, or API keys that have been invalidated by invalidate API Key. This API supports updates to an API keys access scope and metadata. The access scope of an API key is derived from the `role_descriptors` you specify in the request, and a snapshot of the owner users permissions at the time of the request. The snapshot of the owners permissions is updated automatically on every call. If you dont specify `role_descriptors` in the request, a call to this API might still change the API keys access scope. This change can occur if the owner users permissions have changed since the API key was created or last modified. To update another users API key, use the `run_as` feature to submit a request on behalf of another user. IMPORTANT: Its not possible to use an API key as the authentication credential for this API. To update an API key, the owner users credentials are required.
{ref}/security-api-update-api-key.html[{es} documentation]
[discrete]
==== Function signature
[source,ts]
----
(SecurityUpdateApiKeyRequest, options?): Promise<SecurityUpdateApiKeyResponse>
----
[discrete]
==== SecurityUpdateApiKeyRequest
[pass]
++++
<pre>
++++
interface SecurityUpdateApiKeyRequest extends <<RequestBase>> {
id: <<Id>>
role_descriptors?: Record<string, SecurityRoleDescriptor>
metadata?: <<Metadata>>
expiration?: <<Duration>>
}
[pass]
++++
</pre>
++++
[discrete]
==== SecurityUpdateApiKeyResponse
[pass]
++++
<pre>
++++
interface SecurityUpdateApiKeyResponse {
updated: boolean
}
[pass]
++++
</pre>
++++