SAMLProvider Serializer
| Name | Type | Description | Notes |
|---|---|---|---|
| name | str | [optional] | |
| authentication_flow | UUID | Flow used for authentication when the associated application is accessed by an un-authenticated user. | [optional] |
| authorization_flow | UUID | Flow used when authorizing this provider. | [optional] |
| invalidation_flow | UUID | Flow used ending the session from a provider. | [optional] |
| property_mappings | List[UUID] | [optional] | |
| acs_url | str | [optional] | |
| sls_url | str | Single Logout Service URL where the logout response should be sent. | [optional] |
| audience | str | Value of the audience restriction field of the assertion. When left empty, no audience restriction will be added. | [optional] |
| issuer | str | Also known as EntityID | [optional] |
| assertion_valid_not_before | str | Assertion valid not before current time + this value (Format: hours=-1;minutes=-2;seconds=-3). | [optional] |
| assertion_valid_not_on_or_after | str | Assertion not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional] |
| session_valid_not_on_or_after | str | Session not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional] |
| name_id_mapping | UUID | Configure how the NameID value will be created. When left empty, the NameIDPolicy of the incoming request will be considered | [optional] |
| authn_context_class_ref_mapping | UUID | Configure how the AuthnContextClassRef value will be created. When left empty, the AuthnContextClassRef will be set based on which authentication methods the user used to authenticate. | [optional] |
| digest_algorithm | DigestAlgorithmEnum | [optional] | |
| signature_algorithm | SignatureAlgorithmEnum | [optional] | |
| signing_kp | UUID | Keypair used to sign outgoing Responses going to the Service Provider. | [optional] |
| verification_kp | UUID | When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. | [optional] |
| encryption_kp | UUID | When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key. | [optional] |
| sign_assertion | bool | [optional] | |
| sign_response | bool | [optional] | |
| sign_logout_request | bool | [optional] | |
| sign_logout_response | bool | [optional] | |
| sp_binding | SAMLBindingsEnum | This determines how authentik sends the response back to the Service Provider. | [optional] |
| sls_binding | SAMLBindingsEnum | This determines how authentik sends the logout response back to the Service Provider. | [optional] |
| logout_method | SAMLLogoutMethods | Method to use for logout. Front-channel iframe loads all logout URLs simultaneously in hidden iframes. Front-channel native uses your active browser tab to send post requests and redirect to providers. Back-channel sends logout requests directly from the server without user interaction (requires POST SLS binding). | [optional] |
| default_relay_state | str | Default relay_state value for IDP-initiated logins | [optional] |
| default_name_id_policy | SAMLNameIDPolicyEnum | [optional] |
from authentik_client.models.patched_saml_provider_request import PatchedSAMLProviderRequest
# TODO update the JSON string below
json = "{}"
# create an instance of PatchedSAMLProviderRequest from a JSON string
patched_saml_provider_request_instance = PatchedSAMLProviderRequest.from_json(json)
# print the JSON string representation of the object
print(PatchedSAMLProviderRequest.to_json())
# convert the object into a dict
patched_saml_provider_request_dict = patched_saml_provider_request_instance.to_dict()
# create an instance of PatchedSAMLProviderRequest from a dict
patched_saml_provider_request_from_dict = PatchedSAMLProviderRequest.from_dict(patched_saml_provider_request_dict)