Skip to content

Latest commit

 

History

History
57 lines (48 loc) · 4.48 KB

File metadata and controls

57 lines (48 loc) · 4.48 KB

PatchedSAMLProviderRequest

SAMLProvider Serializer

Properties

Name Type Description Notes
name str [optional]
authentication_flow UUID Flow used for authentication when the associated application is accessed by an un-authenticated user. [optional]
authorization_flow UUID Flow used when authorizing this provider. [optional]
invalidation_flow UUID Flow used ending the session from a provider. [optional]
property_mappings List[UUID] [optional]
acs_url str [optional]
sls_url str Single Logout Service URL where the logout response should be sent. [optional]
audience str Value of the audience restriction field of the assertion. When left empty, no audience restriction will be added. [optional]
issuer str Also known as EntityID [optional]
assertion_valid_not_before str Assertion valid not before current time + this value (Format: hours=-1;minutes=-2;seconds=-3). [optional]
assertion_valid_not_on_or_after str Assertion not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). [optional]
session_valid_not_on_or_after str Session not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). [optional]
name_id_mapping UUID Configure how the NameID value will be created. When left empty, the NameIDPolicy of the incoming request will be considered [optional]
authn_context_class_ref_mapping UUID Configure how the AuthnContextClassRef value will be created. When left empty, the AuthnContextClassRef will be set based on which authentication methods the user used to authenticate. [optional]
digest_algorithm DigestAlgorithmEnum [optional]
signature_algorithm SignatureAlgorithmEnum [optional]
signing_kp UUID Keypair used to sign outgoing Responses going to the Service Provider. [optional]
verification_kp UUID When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. [optional]
encryption_kp UUID When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key. [optional]
sign_assertion bool [optional]
sign_response bool [optional]
sign_logout_request bool [optional]
sign_logout_response bool [optional]
sp_binding SAMLBindingsEnum This determines how authentik sends the response back to the Service Provider. [optional]
sls_binding SAMLBindingsEnum This determines how authentik sends the logout response back to the Service Provider. [optional]
logout_method SAMLLogoutMethods Method to use for logout. Front-channel iframe loads all logout URLs simultaneously in hidden iframes. Front-channel native uses your active browser tab to send post requests and redirect to providers. Back-channel sends logout requests directly from the server without user interaction (requires POST SLS binding). [optional]
default_relay_state str Default relay_state value for IDP-initiated logins [optional]
default_name_id_policy SAMLNameIDPolicyEnum [optional]

Example

from authentik_client.models.patched_saml_provider_request import PatchedSAMLProviderRequest

# TODO update the JSON string below
json = "{}"
# create an instance of PatchedSAMLProviderRequest from a JSON string
patched_saml_provider_request_instance = PatchedSAMLProviderRequest.from_json(json)
# print the JSON string representation of the object
print(PatchedSAMLProviderRequest.to_json())

# convert the object into a dict
patched_saml_provider_request_dict = patched_saml_provider_request_instance.to_dict()
# create an instance of PatchedSAMLProviderRequest from a dict
patched_saml_provider_request_from_dict = PatchedSAMLProviderRequest.from_dict(patched_saml_provider_request_dict)

[Back to Model list] [Back to API list] [Back to README]