Oracle Cloud Infrastructure v2.31.0 published on Thursday, Apr 17, 2025 by Pulumi
oci.NetworkFirewall.getNetworkFirewallPolicyDecryptionProfiles
Explore with Pulumi AI
This data source provides the list of Network Firewall Policy Decryption Profiles in Oracle Cloud Infrastructure Network Firewall service.
Returns a list of Decryption Profile for the Network Firewall Policy.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testNetworkFirewallPolicyDecryptionProfiles = oci.NetworkFirewall.getNetworkFirewallPolicyDecryptionProfiles({
    networkFirewallPolicyId: testNetworkFirewallPolicy.id,
    displayName: networkFirewallPolicyDecryptionProfileDisplayName,
});
import pulumi
import pulumi_oci as oci
test_network_firewall_policy_decryption_profiles = oci.NetworkFirewall.get_network_firewall_policy_decryption_profiles(network_firewall_policy_id=test_network_firewall_policy["id"],
    display_name=network_firewall_policy_decryption_profile_display_name)
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/networkfirewall"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := networkfirewall.GetNetworkFirewallPolicyDecryptionProfiles(ctx, &networkfirewall.GetNetworkFirewallPolicyDecryptionProfilesArgs{
			NetworkFirewallPolicyId: testNetworkFirewallPolicy.Id,
			DisplayName:             pulumi.StringRef(networkFirewallPolicyDecryptionProfileDisplayName),
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testNetworkFirewallPolicyDecryptionProfiles = Oci.NetworkFirewall.GetNetworkFirewallPolicyDecryptionProfiles.Invoke(new()
    {
        NetworkFirewallPolicyId = testNetworkFirewallPolicy.Id,
        DisplayName = networkFirewallPolicyDecryptionProfileDisplayName,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallFunctions;
import com.pulumi.oci.NetworkFirewall.inputs.GetNetworkFirewallPolicyDecryptionProfilesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var testNetworkFirewallPolicyDecryptionProfiles = NetworkFirewallFunctions.getNetworkFirewallPolicyDecryptionProfiles(GetNetworkFirewallPolicyDecryptionProfilesArgs.builder()
            .networkFirewallPolicyId(testNetworkFirewallPolicy.id())
            .displayName(networkFirewallPolicyDecryptionProfileDisplayName)
            .build());
    }
}
variables:
  testNetworkFirewallPolicyDecryptionProfiles:
    fn::invoke:
      function: oci:NetworkFirewall:getNetworkFirewallPolicyDecryptionProfiles
      arguments:
        networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
        displayName: ${networkFirewallPolicyDecryptionProfileDisplayName}
Using getNetworkFirewallPolicyDecryptionProfiles
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getNetworkFirewallPolicyDecryptionProfiles(args: GetNetworkFirewallPolicyDecryptionProfilesArgs, opts?: InvokeOptions): Promise<GetNetworkFirewallPolicyDecryptionProfilesResult>
function getNetworkFirewallPolicyDecryptionProfilesOutput(args: GetNetworkFirewallPolicyDecryptionProfilesOutputArgs, opts?: InvokeOptions): Output<GetNetworkFirewallPolicyDecryptionProfilesResult>def get_network_firewall_policy_decryption_profiles(display_name: Optional[str] = None,
                                                    filters: Optional[Sequence[_networkfirewall.GetNetworkFirewallPolicyDecryptionProfilesFilter]] = None,
                                                    network_firewall_policy_id: Optional[str] = None,
                                                    opts: Optional[InvokeOptions] = None) -> GetNetworkFirewallPolicyDecryptionProfilesResult
def get_network_firewall_policy_decryption_profiles_output(display_name: Optional[pulumi.Input[str]] = None,
                                                    filters: Optional[pulumi.Input[Sequence[pulumi.Input[_networkfirewall.GetNetworkFirewallPolicyDecryptionProfilesFilterArgs]]]] = None,
                                                    network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
                                                    opts: Optional[InvokeOptions] = None) -> Output[GetNetworkFirewallPolicyDecryptionProfilesResult]func GetNetworkFirewallPolicyDecryptionProfiles(ctx *Context, args *GetNetworkFirewallPolicyDecryptionProfilesArgs, opts ...InvokeOption) (*GetNetworkFirewallPolicyDecryptionProfilesResult, error)
func GetNetworkFirewallPolicyDecryptionProfilesOutput(ctx *Context, args *GetNetworkFirewallPolicyDecryptionProfilesOutputArgs, opts ...InvokeOption) GetNetworkFirewallPolicyDecryptionProfilesResultOutput> Note: This function is named GetNetworkFirewallPolicyDecryptionProfiles in the Go SDK.
public static class GetNetworkFirewallPolicyDecryptionProfiles 
{
    public static Task<GetNetworkFirewallPolicyDecryptionProfilesResult> InvokeAsync(GetNetworkFirewallPolicyDecryptionProfilesArgs args, InvokeOptions? opts = null)
    public static Output<GetNetworkFirewallPolicyDecryptionProfilesResult> Invoke(GetNetworkFirewallPolicyDecryptionProfilesInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetNetworkFirewallPolicyDecryptionProfilesResult> getNetworkFirewallPolicyDecryptionProfiles(GetNetworkFirewallPolicyDecryptionProfilesArgs args, InvokeOptions options)
public static Output<GetNetworkFirewallPolicyDecryptionProfilesResult> getNetworkFirewallPolicyDecryptionProfiles(GetNetworkFirewallPolicyDecryptionProfilesArgs args, InvokeOptions options)
fn::invoke:
  function: oci:NetworkFirewall/getNetworkFirewallPolicyDecryptionProfiles:getNetworkFirewallPolicyDecryptionProfiles
  arguments:
    # arguments dictionaryThe following arguments are supported:
- Network
Firewall stringPolicy Id  - Unique Network Firewall Policy identifier
 - Display
Name string - A filter to return only resources that match the entire display name given.
 - Filters
List<Get
Network Firewall Policy Decryption Profiles Filter>  
- Network
Firewall stringPolicy Id  - Unique Network Firewall Policy identifier
 - Display
Name string - A filter to return only resources that match the entire display name given.
 - Filters
[]Get
Network Firewall Policy Decryption Profiles Filter  
- network
Firewall StringPolicy Id  - Unique Network Firewall Policy identifier
 - display
Name String - A filter to return only resources that match the entire display name given.
 - filters
List<Get
Policy Decryption Profiles Filter>  
- network
Firewall stringPolicy Id  - Unique Network Firewall Policy identifier
 - display
Name string - A filter to return only resources that match the entire display name given.
 - filters
Get
Network Firewall Policy Decryption Profiles Filter[]  
- network_
firewall_ strpolicy_ id  - Unique Network Firewall Policy identifier
 - display_
name str - A filter to return only resources that match the entire display name given.
 - filters
Sequence[networkfirewall.
Get Network Firewall Policy Decryption Profiles Filter]  
- network
Firewall StringPolicy Id  - Unique Network Firewall Policy identifier
 - display
Name String - A filter to return only resources that match the entire display name given.
 - filters List<Property Map>
 
getNetworkFirewallPolicyDecryptionProfiles Result
The following output properties are available:
- Decryption
Profile List<GetSummary Collections Network Firewall Policy Decryption Profiles Decryption Profile Summary Collection>  - The list of decryption_profile_summary_collection.
 - Id string
 - The provider-assigned unique ID for this managed resource.
 - Network
Firewall stringPolicy Id  - Display
Name string - Filters
List<Get
Network Firewall Policy Decryption Profiles Filter>  
- Decryption
Profile []GetSummary Collections Network Firewall Policy Decryption Profiles Decryption Profile Summary Collection  - The list of decryption_profile_summary_collection.
 - Id string
 - The provider-assigned unique ID for this managed resource.
 - Network
Firewall stringPolicy Id  - Display
Name string - Filters
[]Get
Network Firewall Policy Decryption Profiles Filter  
- decryption
Profile List<GetSummary Collections Policy Decryption Profiles Decryption Profile Summary Collection>  - The list of decryption_profile_summary_collection.
 - id String
 - The provider-assigned unique ID for this managed resource.
 - network
Firewall StringPolicy Id  - display
Name String - filters
List<Get
Policy Decryption Profiles Filter>  
- decryption
Profile GetSummary Collections Network Firewall Policy Decryption Profiles Decryption Profile Summary Collection[]  - The list of decryption_profile_summary_collection.
 - id string
 - The provider-assigned unique ID for this managed resource.
 - network
Firewall stringPolicy Id  - display
Name string - filters
Get
Network Firewall Policy Decryption Profiles Filter[]  
- decryption_
profile_ Sequence[networkfirewall.summary_ collections Get Network Firewall Policy Decryption Profiles Decryption Profile Summary Collection]  - The list of decryption_profile_summary_collection.
 - id str
 - The provider-assigned unique ID for this managed resource.
 - network_
firewall_ strpolicy_ id  - display_
name str - filters
Sequence[networkfirewall.
Get Network Firewall Policy Decryption Profiles Filter]  
- decryption
Profile List<Property Map>Summary Collections  - The list of decryption_profile_summary_collection.
 - id String
 - The provider-assigned unique ID for this managed resource.
 - network
Firewall StringPolicy Id  - display
Name String - filters List<Property Map>
 
Supporting Types
GetNetworkFirewallPolicyDecryptionProfilesDecryptionProfileSummaryCollection         
GetNetworkFirewallPolicyDecryptionProfilesDecryptionProfileSummaryCollectionItem          
- Are
Certificate boolExtensions Restricted  - Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
 - Is
Auto boolInclude Alt Name  - Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
 - Is
Expired boolCertificate Blocked  - Whether to block sessions if server's certificate is expired.
 - Is
Out boolOf Capacity Blocked  - Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
 - Is
Revocation boolStatus Timeout Blocked  - Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
 - Is
Unknown boolRevocation Status Blocked  - Whether to block sessions if the revocation status check for server's certificate results in "unknown".
 - Is
Unsupported boolCipher Blocked  - Whether to block sessions if SSL cipher suite is not supported.
 - Is
Unsupported boolVersion Blocked  - Whether to block sessions if SSL version is not supported.
 - Is
Untrusted boolIssuer Blocked  - Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
 - Name string
 - Unique Name of the decryption profile.
 - Network
Firewall stringPolicy Id  - Unique Network Firewall Policy identifier
 - Parent
Resource stringId  - OCID of the Network Firewall Policy this decryption profile belongs to.
 - Type string
 - Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
 
- Are
Certificate boolExtensions Restricted  - Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
 - Is
Auto boolInclude Alt Name  - Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
 - Is
Expired boolCertificate Blocked  - Whether to block sessions if server's certificate is expired.
 - Is
Out boolOf Capacity Blocked  - Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
 - Is
Revocation boolStatus Timeout Blocked  - Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
 - Is
Unknown boolRevocation Status Blocked  - Whether to block sessions if the revocation status check for server's certificate results in "unknown".
 - Is
Unsupported boolCipher Blocked  - Whether to block sessions if SSL cipher suite is not supported.
 - Is
Unsupported boolVersion Blocked  - Whether to block sessions if SSL version is not supported.
 - Is
Untrusted boolIssuer Blocked  - Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
 - Name string
 - Unique Name of the decryption profile.
 - Network
Firewall stringPolicy Id  - Unique Network Firewall Policy identifier
 - Parent
Resource stringId  - OCID of the Network Firewall Policy this decryption profile belongs to.
 - Type string
 - Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
 
- are
Certificate BooleanExtensions Restricted  - Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
 - is
Auto BooleanInclude Alt Name  - Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
 - is
Expired BooleanCertificate Blocked  - Whether to block sessions if server's certificate is expired.
 - is
Out BooleanOf Capacity Blocked  - Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
 - is
Revocation BooleanStatus Timeout Blocked  - Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
 - is
Unknown BooleanRevocation Status Blocked  - Whether to block sessions if the revocation status check for server's certificate results in "unknown".
 - is
Unsupported BooleanCipher Blocked  - Whether to block sessions if SSL cipher suite is not supported.
 - is
Unsupported BooleanVersion Blocked  - Whether to block sessions if SSL version is not supported.
 - is
Untrusted BooleanIssuer Blocked  - Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
 - name String
 - Unique Name of the decryption profile.
 - network
Firewall StringPolicy Id  - Unique Network Firewall Policy identifier
 - parent
Resource StringId  - OCID of the Network Firewall Policy this decryption profile belongs to.
 - type String
 - Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
 
- are
Certificate booleanExtensions Restricted  - Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
 - is
Auto booleanInclude Alt Name  - Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
 - is
Expired booleanCertificate Blocked  - Whether to block sessions if server's certificate is expired.
 - is
Out booleanOf Capacity Blocked  - Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
 - is
Revocation booleanStatus Timeout Blocked  - Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
 - is
Unknown booleanRevocation Status Blocked  - Whether to block sessions if the revocation status check for server's certificate results in "unknown".
 - is
Unsupported booleanCipher Blocked  - Whether to block sessions if SSL cipher suite is not supported.
 - is
Unsupported booleanVersion Blocked  - Whether to block sessions if SSL version is not supported.
 - is
Untrusted booleanIssuer Blocked  - Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
 - name string
 - Unique Name of the decryption profile.
 - network
Firewall stringPolicy Id  - Unique Network Firewall Policy identifier
 - parent
Resource stringId  - OCID of the Network Firewall Policy this decryption profile belongs to.
 - type string
 - Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
 
- are_
certificate_ boolextensions_ restricted  - Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
 - is_
auto_ boolinclude_ alt_ name  - Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
 - is_
expired_ boolcertificate_ blocked  - Whether to block sessions if server's certificate is expired.
 - is_
out_ boolof_ capacity_ blocked  - Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
 - is_
revocation_ boolstatus_ timeout_ blocked  - Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
 - is_
unknown_ boolrevocation_ status_ blocked  - Whether to block sessions if the revocation status check for server's certificate results in "unknown".
 - is_
unsupported_ boolcipher_ blocked  - Whether to block sessions if SSL cipher suite is not supported.
 - is_
unsupported_ boolversion_ blocked  - Whether to block sessions if SSL version is not supported.
 - is_
untrusted_ boolissuer_ blocked  - Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
 - name str
 - Unique Name of the decryption profile.
 - network_
firewall_ strpolicy_ id  - Unique Network Firewall Policy identifier
 - parent_
resource_ strid  - OCID of the Network Firewall Policy this decryption profile belongs to.
 - type str
 - Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
 
- are
Certificate BooleanExtensions Restricted  - Whether to block sessions if the server's certificate uses extensions other than key usage and/or extended key usage.
 - is
Auto BooleanInclude Alt Name  - Whether to automatically append SAN to impersonating certificate if server certificate is missing SAN.
 - is
Expired BooleanCertificate Blocked  - Whether to block sessions if server's certificate is expired.
 - is
Out BooleanOf Capacity Blocked  - Whether to block sessions if the firewall is temporarily unable to decrypt their traffic.
 - is
Revocation BooleanStatus Timeout Blocked  - Whether to block sessions if the revocation status check for server's certificate does not succeed within the maximum allowed time (defaulting to 5 seconds).
 - is
Unknown BooleanRevocation Status Blocked  - Whether to block sessions if the revocation status check for server's certificate results in "unknown".
 - is
Unsupported BooleanCipher Blocked  - Whether to block sessions if SSL cipher suite is not supported.
 - is
Unsupported BooleanVersion Blocked  - Whether to block sessions if SSL version is not supported.
 - is
Untrusted BooleanIssuer Blocked  - Whether to block sessions if server's certificate is issued by an untrusted certificate authority (CA).
 - name String
 - Unique Name of the decryption profile.
 - network
Firewall StringPolicy Id  - Unique Network Firewall Policy identifier
 - parent
Resource StringId  - OCID of the Network Firewall Policy this decryption profile belongs to.
 - type String
 - Describes the type of Decryption Profile SslForwardProxy or SslInboundInspection.
 
GetNetworkFirewallPolicyDecryptionProfilesFilter      
Package Details
- Repository
 - oci pulumi/pulumi-oci
 - License
 - Apache-2.0
 - Notes
 - This Pulumi package is based on the 
ociTerraform Provider.