Skip to content

Latest commit

 

History

History
52 lines (43 loc) · 3.23 KB

File metadata and controls

52 lines (43 loc) · 3.23 KB

LDAPProvider

LDAPProvider Serializer

Properties

Name Type Description Notes
pk int [readonly]
name str
authentication_flow UUID Flow used for authentication when the associated application is accessed by an un-authenticated user. [optional]
authorization_flow UUID Flow used when authorizing this provider.
invalidation_flow UUID Flow used ending the session from a provider.
property_mappings List[UUID] [optional]
component str Get object component so that we know how to edit the object [readonly]
assigned_application_slug str Internal application name, used in URLs. [readonly]
assigned_application_name str Application's display Name. [readonly]
assigned_backchannel_application_slug str Internal application name, used in URLs. [readonly]
assigned_backchannel_application_name str Application's display Name. [readonly]
verbose_name str Return object's verbose_name [readonly]
verbose_name_plural str Return object's plural verbose_name [readonly]
meta_model_name str Return internal model name [readonly]
base_dn str DN under which objects are accessible. [optional]
certificate UUID [optional]
tls_server_name str [optional]
uid_start_number int The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber [optional]
gid_start_number int The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber [optional]
outpost_set List[str] [readonly]
search_mode LDAPAPIAccessMode [optional]
bind_mode LDAPAPIAccessMode [optional]
mfa_support bool When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. [optional]

Example

from authentik_client.models.ldap_provider import LDAPProvider

# TODO update the JSON string below
json = "{}"
# create an instance of LDAPProvider from a JSON string
ldap_provider_instance = LDAPProvider.from_json(json)
# print the JSON string representation of the object
print(LDAPProvider.to_json())

# convert the object into a dict
ldap_provider_dict = ldap_provider_instance.to_dict()
# create an instance of LDAPProvider from a dict
ldap_provider_from_dict = LDAPProvider.from_dict(ldap_provider_dict)

[Back to Model list] [Back to API list] [Back to README]